• Complain

Joe Gray - Practical Social Engineering: A Primer for the Ethical Hacker

Here you can read online Joe Gray - Practical Social Engineering: A Primer for the Ethical Hacker full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: No Starch Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Joe Gray Practical Social Engineering: A Primer for the Ethical Hacker
  • Book:
    Practical Social Engineering: A Primer for the Ethical Hacker
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Practical Social Engineering: A Primer for the Ethical Hacker: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Practical Social Engineering: A Primer for the Ethical Hacker" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A guide to hacking the human element.
Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.
Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once youve succeeded in harvesting information about your targets with advanced OSINT methods, youll discover how to defend your own organization from similar threats.
Youll learn how to:
  • Apply phishing techniques like spoofing, squatting, and standing up your own web server to avoid detection
  • Use OSINT tools like Recon-ng, theHarvester, and Hunter
  • Capture a targets information from social media
  • Collect and report metrics about the success of your attack
  • Implement technical controls and awareness programs to help defend against social engineering

Fast-paced, hands-on, and ethically focused, Practical Social Engineering is a book every pentester can put to use immediately.

Joe Gray: author's other books


Who wrote Practical Social Engineering: A Primer for the Ethical Hacker? Find out the surname, the name of the author of the book and a list of all author's works by series.

Practical Social Engineering: A Primer for the Ethical Hacker — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Practical Social Engineering: A Primer for the Ethical Hacker" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Practical Social Engineering A Primer for the Ethical Hacker by Joe Gray - photo 1
Practical Social Engineering
A Primer for the Ethical Hacker

by Joe Gray

PRACTICAL SOCIAL ENGINEERING Copyright 2022 by Joe Gray All rights reserved - photo 2

PRACTICAL SOCIAL ENGINEERING. Copyright 2022 by Joe Gray.

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

First printing

25 24 23 22 1 2 3 4 5 6 7 8 9

ISBN-13: 978-1-7185-0098-3 (print)
ISBN-13: 978-1-7185-0099-0 (ebook)

Publisher: William Pollock
Managing Editor: Jill Franklin
Production Manager: Rachel Monaghan
Developmental Editor: Frances Saux
Production Editors: Rachel Monaghan and Miles Bond
Interior and Cover Design: Octopod Studios
Technical Reviewer: Ken Pyle
Copyeditor: Sharon Wilkey
Compositor: Maureen Forys, Happenstance Type-O-Rama
Proofreader: James M. Fraleigh
Cover Illustrator: Rick Reese
Indexer: Beth Nauman-Montana

For information on distribution, bulk sales, corporate sales, or translations, please contact No Starch Press, Inc. directly at info@nostarch.com or:

No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
1-415-863-9900
www.nostarch.com

Library of Congress Cataloging-in-Publication Data

Names: Gray, Joe, author.
Title: Practical social engineering : a primer for the ethical hacker / Joe
Gray.
Description: San Francisco : No Starch Press, [2021] | Includes index. |
Identifiers: LCCN 2021004736 (print) | LCCN 2021004737 (ebook) | ISBN
9781718500983 (print) | ISBN 9781718500990 (ebook)
Subjects: LCSH: Penetration testing (Computer security) | Online social
networks--Security measures. | Internet fraud--Prevention. | Social
engineering--Case studies.
Classification: LCC QA76.9.A25 G7425 2021 (print) | LCC QA76.9.A25
(ebook) | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2021004736
LC ebook record available at https://lccn.loc.gov/2021004737

No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.

To Junior, Pudding, Mom, Nannie, Mimi, and Mammaw: This one is for youI couldnt have done this without you! Youre the real MVPs!

About the Author

Joe Gray, a US Navy veteran, is the founder and principal instructor of The OSINTion, the founder and principal investigator of Transparent Intelligence Services, and the inaugural winner of the DerbyCon Social Engineering CTF. A member of the Password Inspection Agency, Gray won the TraceLabs OSINT Search Party at DEFCON 28. He recently authored the OSINT and OPSEC tools DECEPTICON Bot and WikiLeaker.

About the Technical Reviewer

Ken Pyle is a partner of CYBIR, specializing in information security, exploit development, penetration testing, and enterprise risk management, as well as a graduate professor of cybersecurity at Chestnut Hill College. As a highly rated and popular lecturer on information security, he has presented at industry events such as DEFCON, ShmooCon, Secureworld, and HTCIA International.

Acknowledgments

First and foremost, to readers: thank you for your patience with my book; I hope you enjoy it and believe it was worth the wait.

I would not be at this point without the support of my family. You are my rockI love you all!

Throughout my career, I have been able to see further by standing on the shoulders of giants. This is a reference to an Isaac Newton quote that Mr. Jack Daniel frequently quoted, and it is the truth. Jack is but one giant whose shoulders I have stood upon to see and learn more in my efforts to grow.

I cannot stress how much I have learned from others in the infosec, social engineering, and OSINT communitiesstarting with my first mentors in infosec, Jim Roller and Luke Winkleman. They took a bubblehead fresh out of the Navy, probably still smelling like amine, and included me in meetings when otherwise I would be doing busywork. I would also like to thank my previous manager and mentor, Jerry Bell, for encouraging me to submit the proposal for this book and helping to rein in my wild ideas.

To the social engineering and OSINT folks, I apologize in advance if I leave anyone out. Social engineering is on the forefront of infosec because of the work that Chris Hadnagy has done (and continues to do). I am eternally thankful for the opportunity to compete in the SECTF, but even before that, for Chriss book being in the school library when I was racking my brain for topics to research for my PhD dissertation (which I havent finished... yet). Michael Bazzell is the OG of OSINT. OSINT wouldnt be where it is without his work.

Conferences like Security BSides, DerbyCon, and especially Layer 8 helped me meet other likeminded people that I was able to collaborate with and learn from. I cherish my conversations with people like Jeff Man, Alethe Denis, Ginsberg5150, Marcelle Lee, the late Jon Case, Judy Towers, Chris Kirsch, Chris Silvers, Micah Hoffman, Jenny Radcliffe, and Chris Kubecka. Again, I apologize if I left anyone off, but this list could probably end up longer than the book itself.

Beyond competing in the SECTF, I am grateful to TraceLabs not only for doing the legwork so I could collaborate with the authorities for the OSINT Search Parties, but also for holding the conferences for hosting them (pre-COVID) and for partnering with The OSINTion to help competitors, the authorities, and most importantly, the missing. Thank you to Adrian, James, Robert, Belouve, Tom, and Levi. Thank you also to BSides Atlanta and NOLACon for hosting OSINT CTFs.

Finally, I must thank Bill, Frances, Rachel, and Sharon at No Starch Press for having the patience to wait for me to finish this book. I hope that they, and you, are happy with the final result, and I apologize for any gray hairs that I may have caused.

Introduction
Social engineering is a lethal attack vector It is often used as a means of - photo 3

Social engineering is a lethal attack vector. It is often used as a means of delivering malware or other payloads, but sometimes it is the endgame, such as in attacks designed to trick victims into handing over their banking information. The beautiful disaster that comes from social engineering is that, aside from phishing, it is really hard to detect. Whether youre just breaking into the information security industry, a seasoned penetration tester, or on the defensive side, you will likely be exposed to social engineering sooner rather than later.

Exploring the why before the how of social engineering can amplify your understanding, help you build better processes and detections, and enable you to identify the singular flaw in the logic of a process to succeed in your exploitation. The how will change over time, but the why is rooted in hundreds, if not thousands, of years of human DNA.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Practical Social Engineering: A Primer for the Ethical Hacker»

Look at similar books to Practical Social Engineering: A Primer for the Ethical Hacker. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Practical Social Engineering: A Primer for the Ethical Hacker»

Discussion, reviews of the book Practical Social Engineering: A Primer for the Ethical Hacker and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.