Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking


$31.49 $34.99 Save 10% Current price is $31.49, Original price is $34.99. You Save 10%.
View All Available Formats & Editions
Eligible for FREE SHIPPING
  • Want it by Wednesday, October 24?   Order by 12:00 PM Eastern and choose Expedited Shipping at checkout.


Social Engineering: The Art of Human Hacking by Christopher Hadnagy

The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers

From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering.

Kevin Mitnick—one of the most famous social engineers inthe world—popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing atarget to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access
  • Reveals vital steps for preventing social engineeringthreats

Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers—now you can doyour part by putting to good use the critical information withinits pages.

Product Details

ISBN-13: 9780470639535
Publisher: Wiley
Publication date: 12/28/2010
Pages: 416
Sales rank: 161,786
Product dimensions: 6.00(w) x 8.90(h) x 1.00(d)

About the Author

Christopher Hadnagy is the lead developer of, the world's first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security's penetration testing team.

Table of Contents

Foreword xiii

Preface and Acknowledgments xvii

1 A Look into the World of Social Engineering 1

Why This Book Is So Valuable 3

Overview of Social Engineering 9

Summary 21

2 Information Gathering 23

Gathering Information 26

Sources for Information Gathering 33

Communication Modeling 43

The Power of Communication Models 53

3 Eficitation 55

What Is Elicitation? 56

The Goals of Elicitation 58

Mastering Elicitation 74

Summary 76

4 Pretexting: How to Become Anyone 77

What Is Pretexting? 78

The Principles and Planning Stages of Pretexting 79

Successful Pretexting 91

Summary 99

5 Mind Tricks: Psychological Principles Used in Social Engineering 101

Modes of Thinking 103

Microexpressions 109

Neurolinguistic Programming (NLP) 136

Interview and Interrogation 143

Building Instant Rapport 162

The Human Buffer Overflow 172

Summary 178

6 Influence: The Power of Persuasion 181

The Five Fundamentals of Influence and Persuasion 182

Influence Tactics 187

Altering Reality: Framing 215

Manipulation: Controlling Your Target 233

Manipulation in Social Engineering 248

Summary 256

7 The Tools of the Social Engineer 259

Physical Tools 260

Online Information-Gathering Tools 279

Summary 297

8 Case Studies: Dissecting the Social Engineer 299

Mitnick Case Study 1: Hacking the DMV 300

Mitnick Case Study 2: Hacking the Social Security Administration 306

Hadnagy Case Study 1: The Overconfident CEO 310

Hadnagy Case Study 2: The Theme Park Scandal 317

Top-Secret Case Study 1: Mission Not Impossible 322

Top-Secret Case Study 2: Social Engineering a Hacker 329

Why Case Studies Are Important 337

Summary 338

9 Prevention and Mitigation 339

Learning to Identify Social Engineering Attacks 340

Creating a Personal Security Awareness Culture 341

Being Aware of the Value of the Information You Are Being Asked For 344

Keeping Software Updated 347

Developing Scripts 348

Learning from Social Engineering Audits 348

Concluding Remarks 354

Summary 361

Index 363

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Social Engineering: The Art of Human Hacking 4.6 out of 5 based on 0 ratings. 14 reviews.
k4b00m More than 1 year ago
Social Engineering: The Art of Human Hacking by Chris Hadnagy is the prime handbook for social engineers. It's an exciting look into the art of social engineering from the inside out. The provided guidelines and in-depth insider tips make this book a must have for beginners and experts alike. The ideas presented are well thought out and give a very practical look into the daily practices of social engineers. The book's informative approach and flowing directive make it a read that I simply could not put down. I especially enjoyed Chapter 4 about Pretexting. It is great to see Chris's fresh approach to social engineer methodologies, and security through education... He gives you insight into the techniques being used by real social engineers to help in protecting yourself from attacks. I would definitely recommend this book to my family, friends, and co-workers. Thank you Chris, once again, for providing the Social Engineering community with an excellent resource of information!
MsSherlock More than 1 year ago
This book is for anyone interested in human nature, but it also covers important topics such as your online safety, pretexting, info gathering, and much more, plus it's easy to read and understand. A wealth of information for everyone, no matter what profession you happen to be in. An exciting read with fun stories make this a book you don't want to put down!
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago