HACKING: Social Engineering Attacks, Techniques & Prevention
Written by Alex Wagner
Narrated by Jack Bellows
5/5
()
About this audiobook
This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers.
If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY.
The focus of this book will be to introduce some of the most well known social engineering techniques.
This book contains step by step deployment guides of performances on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.
IN THIS BOOK YOU WILL LEARN ABOUT:
-Phishing, Vishing, Smishing, Spear Phishing and Whaling
-The history of social engineering
-Psychological manipulation
-Human Weaknesses
-Social Engineering Categories
-Cold Call Virus Scams
-Authority & Fear Establishment
-Executing the Social Engineering Attack
-Signifying Legitimacy by Providing Value
-Open-Source Intelligence
-Organizational Reconnaissance
-Identifying Targets Within an Organization
-In-person social engineering techniques
-Dumpster Diving & Data Breaches
-Phishing Page Types
-Filter Evasion Techniques
-How to use PhishTank and Phish5
-Identity Theft and Impersonation
-Social Engineering Countermeasures
-Paper & Digital Record Destruction
-Physical Security Measures
-Principle of Least Privilege
-2FA & Side Channel ID Verification
-Logging & Monitoring
-How to respond to an Attack
-Tips to Avoid Being a Victim
BUY THIS BOOK NOW AND GET STARTED TODAY!
More audiobooks from Alex Wagner
HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsHACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5
Related to HACKING
Related audiobooks
Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsCYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Hacking For Dummies, 7th Edition Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Security Awareness For Dummies Rating: 5 out of 5 stars5/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 5 out of 5 stars5/5ETHICAL HACKING FOR BEGINNERS: HOW TO BUILD YOUR PEN TEST LAB FAST Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5
Operating Systems For You
AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5Linux for Beginners: 3 BOOKS IN 1 Rating: 4 out of 5 stars4/5The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Rating: 0 out of 5 stars0 ratingsThe Linux Command Line Beginner's Guide Rating: 5 out of 5 stars5/5Linux for Beginners: How to Perform Linux Admin Tasks Rating: 5 out of 5 stars5/5History of Google Android Rating: 3 out of 5 stars3/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Active Directory: Network Management Best Practices For System Administrators Rating: 0 out of 5 stars0 ratingsQuick Start Kubernetes Rating: 0 out of 5 stars0 ratingsMastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 Rating: 0 out of 5 stars0 ratingsLinux for Beginners: How to Master the Linux Operating System and Command Line from Scratch Rating: 3 out of 5 stars3/5LINUX FOR BEGINNERS: An easy and Comprehensive Guide to Learn Linux Operating System and Master Linux Command Line Rating: 0 out of 5 stars0 ratingsLinux for Beginners: 37 Linux Commands you Must Know Rating: 4 out of 5 stars4/5Docker Unboxed: Mastering Modern Infrastructure with Container Technology Rating: 0 out of 5 stars0 ratingsAndroid Development With Kotlin: Novice To Ninja Rating: 0 out of 5 stars0 ratingsHistory of Apple iOS Rating: 5 out of 5 stars5/5Operating System Bundle: 2 in 1 Bundle, Windows 7, Android Rating: 5 out of 5 stars5/5Azure DevOps Engineer: Exam AZ-400: Azure DevOps Engineer: Exam AZ-400 Designing and Implementing Microsoft DevOps Solutions Rating: 0 out of 5 stars0 ratingsiPhone 15 Guide for Seniors Rating: 5 out of 5 stars5/5Androids: The Team that Built the Android Operating System Rating: 5 out of 5 stars5/5
Related categories
Reviews for HACKING
2 ratings0 reviews