Página inicialGruposDiscussãoMaisZeitgeist
Pesquise No Site
Este site usa cookies para fornecer nossos serviços, melhorar o desempenho, para análises e (se não estiver conectado) para publicidade. Ao usar o LibraryThing, você reconhece que leu e entendeu nossos Termos de Serviço e Política de Privacidade . Seu uso do site e dos serviços está sujeito a essas políticas e termos.
Hide this

Resultados do Google Livros

Clique em uma foto para ir ao Google Livros

Social Engineering: The Art of Human Hacking…
Carregando...

Social Engineering: The Art of Human Hacking (edição: 2010)

de Christopher Hadnagy (Autor), Paul Wilson (Prefácio)

MembrosResenhasPopularidadeAvaliação médiaConversas
317664,056 (3.44)Nenhum(a)
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
Membro:AtrixWolfe
Título:Social Engineering: The Art of Human Hacking
Autores:Christopher Hadnagy (Autor)
Outros autores:Paul Wilson (Prefácio)
Informação:Wiley (2010), Edition: 1, 416 pages
Coleções:Sua biblioteca
Avaliação:
Etiquetas:Nenhum(a)

Detalhes da Obra

Social Engineering: The Art of Human Hacking de Christopher Hadnagy

Nenhum(a)
Carregando...

Registre-se no LibraryThing tpara descobrir se gostará deste livro.

Ainda não há conversas na Discussão sobre este livro.

Mostrando 1-5 de 6 (seguinte | mostrar todas)
This book is far from perfect, but it is the best book I’ve found on how-to social engineering as an overall field vs either a bunch of case studies or narrow guides to specific techniques. The biggest problem was using the same set of examples to illustrate multiple ostensibly distinct techniques — admittedly a lot of the distinctions were arbitrary to begin with — and the structure of the book wasn’t as clear as it could be. However, this book (and the author’s other resources on the Internet) are great resources for interested individuals, non-SE security people, or administrators. ( )
  octal | Jan 1, 2021 |
This is a pretty good white-hat breakdown of techniques that exploit the more psychological aspects of hacking.

Indeed, while it does go into some really decent detail focusing on awareness of methods, it really shines in highlighting how one might go into business as an Auditor, themselves.

All in all, it is the modern confidence game. You've got thieves and thief-takers. You've got an amazing variety of people out there that simply don't take enough precautions and then you've got others that aren't paying close enough attention to the RIGHT kind of precautions.

Can you imagine having a multi-million dollar security system, teams of devoted security analysts, a fort-knox door, good key cards, and an excellent magnetic lock... all foiled by waving a t-shirt? Or because you helped a secretary out by warning her of her bad-mood boss... or by being an all-right guy helping you out of a jam?

But these kinds of things happen all the time. We've all heard of fishing. We know not to open untrusted pdf files. We know that we need to keep our software updated and relatively better protected from old exploits. RIGHT? Well, apparently not. Social creatures do as social creatures do. People who help you out of jams or mirror your expressions or appear out of nowhere with official-sounding titles and excellent business cards are always... TRUSTED. Someone with a CFO title demands that you do something or lose your job. What do you do?

The thing is, most businesses set themselves up for this kind of chicanery. If you instill respect and/or fear in your employees, don't be surprised when someone from the outside exploits the natural human reactions that come with being mistreated and/or indoctrinated. Being free to ask questions and verify credentials should be encouraged... even when an angry CFO keeps threatening an employee. (Real or not real, the terms of engagement ought to be the same.)

Alas. There's a lot more like this in the book and it's all pretty fascinating. It helps to be a genuine people person if you get into this line of work, but there are lots of different kinds of techniques. The point is to have a well-rounded toolbox and display confidence. Because you're a white-hat... right? ( )
  bradleyhorner | Jun 1, 2020 |
There is some good info in here, but it really wasn't worth slogging through the copy and paste information from various fields, poor writing, and cheesy dialogue. Might be a good intro to social engineering if you know nothing on the subject, but as for practical uses you're better off getting your information elsewhere. ( )
  Andrewsk1 | Jan 12, 2019 |
This book was a very nice blend of technology, social rules and customs, and even psychology--Hadnagy has definitely done his homework. The good thing is that Hadnagy wrote this book to help people--and organizations--increase their security.

I'm thankful that the author is writing this book to help us protect ourselves...rather than using the information to scam us like he could!

Although it was an interesting read, it only got 3 stars due to the focus on organizations--I would have liked to have seen more on individuals protecting themselves. ( )
  csweder | Jul 8, 2014 |
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. ( )
Esta crítica foi marcada por vários usuários como um abuso ods termos de uso e não será mais exibida (exibir).
  MarkBeronte | Jan 7, 2014 |
Mostrando 1-5 de 6 (seguinte | mostrar todas)
sem resenhas | adicionar uma resenha

» Adicionar outros autores

Nome do autorFunçãoTipo de autorObra?Status
Christopher Hadnagyautor principaltodas as ediçõescalculado
Wilson, Paulautor principaltodas as ediçõesconfirmado
Você deve entrar para editar os dados de Conhecimento Comum.
Para mais ajuda veja a página de ajuda do Conhecimento Compartilhado.
Título canônico
Título original
Títulos alternativos
Data da publicação original
Pessoas/Personagens
Lugares importantes
Eventos importantes
Filmes relacionados
Premiações
Epígrafe
Dedicatória
Primeiras palavras
Citações
Últimas palavras
Aviso de desambiguação
Editores da Publicação
Autores Resenhistas (normalmente na contracapa do livro)
Idioma original
CDD/MDS canônico
Canonical LCC
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.

Não foram encontradas descrições de bibliotecas.

Descrição do livro
Resumo em haiku

Capas populares

Links rápidos

Avaliação

Média: (3.44)
0.5
1 3
1.5
2 3
2.5 1
3 9
3.5 5
4 7
4.5
5 8

É você?

Torne-se um autor do LibraryThing.

 

Sobre | Contato | LibraryThing.com | Privacidade/Termos | Ajuda/Perguntas Frequentes | Blog | Loja | APIs | TinyCat | Bibliotecas Históricas | Os primeiros revisores | Conhecimento Comum | 162,269,781 livros! | Barra superior: Sempre visível