Book Image

Learn Social Engineering

Book Image

Learn Social Engineering

Overview of this book

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts.
Table of Contents (16 chapters)

Introduction

A social engineering attack is hardly ever a mistake. It cannot be compared to credit card fraud or an email hack that can be targeted at anyone. It is one of the reasons that makes social engineering a very successful attack method with less chance of failure. It is focused on a target and the attacker does not lose focus on the target until the attack is done or cannot be done. In unfortunate circumstances for the attacker, sometimes an attack will have to be called off if the attacker believes that the target has made them, or the prime objective has been lost such as the target losing money or their access to money. Security companies have been cataloguing the types of people and organizations that have been attacked by social engineers and there seems to be some consistency. Based on that consistency, this chapter will give more information about the types of...