HACKING: Social Engineering Attacks, Techniques & Prevention
Written by Alex Wagner
Narrated by Jack Bellows
5/5
()
About this audiobook
This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers.
If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY.
The focus of this book will be to introduce some of the most well known social engineering techniques.
This book contains step by step deployment guides of performances on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.
IN THIS BOOK YOU WILL LEARN ABOUT:
-Phishing, Vishing, Smishing, Spear Phishing and Whaling
-The history of social engineering
-Psychological manipulation
-Human Weaknesses
-Social Engineering Categories
-Cold Call Virus Scams
-Authority & Fear Establishment
-Executing the Social Engineering Attack
-Signifying Legitimacy by Providing Value
-Open-Source Intelligence
-Organizational Reconnaissance
-Identifying Targets Within an Organization
-In-person social engineering techniques
-Dumpster Diving & Data Breaches
-Phishing Page Types
-Filter Evasion Techniques
-How to use PhishTank and Phish5
-Identity Theft and Impersonation
-Social Engineering Countermeasures
-Paper & Digital Record Destruction
-Physical Security Measures
-Principle of Least Privilege
-2FA & Side Channel ID Verification
-Logging & Monitoring
-How to respond to an Attack
-Tips to Avoid Being a Victim
BUY THIS BOOK NOW AND GET STARTED TODAY!
More audiobooks from Alex Wagner
HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsHACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5
Related to HACKING
Related audiobooks
Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsCybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsHacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Security Awareness For Dummies Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsETHICAL HACKING FOR BEGINNERS: HOW TO BUILD YOUR PEN TEST LAB FAST Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Hacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Rating: 0 out of 5 stars0 ratings
Operating Systems For You
AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Rating: 0 out of 5 stars0 ratingsLinux for Beginners: How to Master the Linux Operating System and Command Line from Scratch Rating: 3 out of 5 stars3/5Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 Rating: 0 out of 5 stars0 ratingsHackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Linux for Beginners: 3 BOOKS IN 1 Rating: 4 out of 5 stars4/5The Linux Command Line Beginner's Guide Rating: 5 out of 5 stars5/5Quick Start Kubernetes Rating: 0 out of 5 stars0 ratingsActive Directory: Network Management Best Practices For System Administrators Rating: 0 out of 5 stars0 ratingsLINUX FOR BEGINNERS: An easy and Comprehensive Guide to Learn Linux Operating System and Master Linux Command Line Rating: 0 out of 5 stars0 ratingsLinux for Beginners: 37 Linux Commands you Must Know Rating: 4 out of 5 stars4/5History of Apple iOS Rating: 5 out of 5 stars5/5Linux for Beginners: How to Perform Linux Admin Tasks Rating: 5 out of 5 stars5/5Android Development With Kotlin: Novice To Ninja Rating: 0 out of 5 stars0 ratingsAndroids: The Team that Built the Android Operating System Rating: 5 out of 5 stars5/5History of Google Android Rating: 3 out of 5 stars3/5Docker Unboxed: Mastering Modern Infrastructure with Container Technology Rating: 0 out of 5 stars0 ratingsMastering Docker: The Ultimate Guide to Seamless Software Development Rating: 0 out of 5 stars0 ratingsAzure DevOps Engineer: Exam AZ-400: Azure DevOps Engineer: Exam AZ-400 Designing and Implementing Microsoft DevOps Solutions Rating: 0 out of 5 stars0 ratingsOperating System Bundle: 2 in 1 Bundle, Windows 7, Android Rating: 5 out of 5 stars5/5
Related categories
Reviews for HACKING
2 ratings0 reviews