Description

This book teaches you the "how-to" of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body language, to the practical techniques for manipulating human perception, plus a whole lot more. Since you can apply the material in this book to your everyday life, you will be better at both influencing others, and preventing yourself from being influenced. Regardless of how you use the skills that you develop, you will gain an understanding and perspective that few others have...

Key Features

  • Increase your influence by predicting people's behavior -- and adapting on the fly
  • Never before published tactics and techniques -- straight from the field
  • Use in-field exercises and other learning tools, to build the skills necessary for successful social engineering

Readership

Penetration testers and IT security professionals, including system/network administrators

Table of Contents

Chapter 1 - Introduction: How Social Engineering Works in the Real World
Chapter 2 - Frames: The Essence of Social Engineering
Chapter 3 - Emotions: The Invisible Hand that Guides Us
Chapter 4 - Body Language: Actions Speak Louder than Words
Chapter 5 - Cialdini's Weapons of Influence: Cross Culture Persuasion Patterns
Chapter 6 - Operational Social Engineering: High Level Strategies and Approaches
Chapter 7 - Tactical Social Engineering: Infield Strategies
Chapter 8 - Ethics: Trust and Morality

Details

No. of pages:
324
Language:
English
Copyright:
© 2012
Published:
Imprint:
Syngress
Print ISBN:
9781597495769
Electronic ISBN:
9781597495776

About the author

Mike Murr

Michael Murr (GCIH, GCFA, GREM) is a consultant with Social Exploits. Social Exploits is a consulting firm based in Los Angeles, California that provides guidance, research, and support in the fields of persuasion and security. Michael’s specialities include the use of frames, non-verbal communication and elicitation. Michael holds a bachelor’s degree in computer science from California State University Channel Islands. He is a certified SANS instructor, and regularly teaches classes in information security, digital forensics, and investigations. Michael is also a member of the Association of Computing Machinery and the Reid Institute.

Affiliations and Expertise

(GCIH, GCFA, GREM) is a consultant with Social Exploits. Social Exploits is a consulting firm based in Los Angeles, California that provides guidance, research, and support in the fields of persuasion and security. Michael is also a certified SANS instructor, he teaches classes in information security, digital forensics, and investigations. He is also a member of the Association of Computing Machinery and the Reid Institute.