- Paperback: 416 pages
- Publisher: Wiley; 1 edition (December 21, 2010)
- Language: English
- ISBN-10: 0470639539
- ISBN-13: 978-0470639535
- Product Dimensions: 5.9 x 1.1 x 8.9 inches
- Shipping Weight: 1.1 pounds (View shipping rates and policies)
- Average Customer Review: 186 customer reviews
- Amazon Best Sellers Rank: #29,405 in Books (See Top 100 in Books)
To get the free app, enter your mobile phone number.
Social Engineering: The Art of Human Hacking 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
From the Publisher
|Social Engineering: The Art of Human Hacking||Unmasking the Social Engineer: The Human Element of Security||Social Engineering and Nonverbal Behavior Set|
|Product Format||Paperback||Paperback||Two Paperback Set|
|Audience Level||Beginner to Advanced||Beginner to Advanced||Beginner to Advanced|
|Content Length||416 pages||256 pages||752 pages|
|Author||Christopher Hadnagy & Paul Wilson||Christopher Hadnagy, Paul F. Kelly, & Paul Ekman||Christopher Hadnagy|
|Publication Date||December 2010||February 2014||February 2014|
|Product Description||Tackles the unpredictable human element of security and walks readers through a unique framework for social engineering, explaining each principle before illustrating it with real-world security case studies||Helps security professionals decipher what people 'aren't saying' by focusing on the role of nonverbal communication in social engineering and how thinking like a human hacker can help uncover security vulnerabilities||Includes full-length versions of Social Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security at a discounted price|
From the Inside Flap
Forward written by Paul Wilson from The Real Hustle UK.
From the Back Cover
"Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever-present dangers to your business — and even to yourself. Truly groundbreaking."
—Kevin Hogan, author of The Science of Influence: How to Get Anyone to Say "Yes" in 8 Minutes or Less
Discover the secrets of expert con men and human hackers
No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against.
This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Tour the Dark World of Social Engineering
Learn the psychological principles employed by social engineers and how they're used
Discover persuasion secrets that social engineers know well
See how the crafty crook takes advantage of cameras, GPS devices, and caller ID
Find out what information is, unbelievably, available online
Study real-world social engineering exploits step by step
"Most malware and client-side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it's done by revealing the social engineering vectors used by today's intruders. His book will help you gain better insight on how to recognize these types of attacks."
—Kevin Mitnick, Author, Speaker, and Consultant
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 85%). Print edition purchase must be sold by Amazon. Learn more.
For thousands of qualifying books, your past, present, and future print-edition purchases now lets you buy the Kindle edition for $2.99 or less. (Textbooks available for $9.99 or less.)
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I know this book is somewhat controversial because it explains how to trick and con people. I think this type of information needs to be more widely publicized, if people only understood the threats that exist out there and how to avoid them then many security problems could be adverted. This book focuses strongly on humans as the weakest link in any security environment, this will always be true. If you are looking for an overview of both digital and local security, this book is fantastic. Also a great book for experienced pen testers looking for some new tools
Mr. Hadnagy organizes his book in a very thoughtful way, showing many case studies and examples of the terms in use. The topics escalate from information gathering to elicitation, onward to pretexting (how to become anyone in another person's eyes/ears), and psychological methods of tricking others. He discusses interviewing and interrogation, and spends a lot of time on influencing and manipulating others in a social engineering setting.
The book wraps up with a discussion of tools useful for anyone examining social engineering during security audits or social engineering/penetrating tests. There are a number of case studies that demonstrate how social engineers do their work, including some stories by the infamous Kevin Mitnick! Finally, the book wraps up with a discussion on how to prevent and mitigate the SE threat. Those working in the security field will find this discussion valuable and likely the most important part of the book. The challenge is daunting and Mr. Hadnagy discusses realistic methods for countering this insidious threat to our businesses and organizations.
To compliment the book, Mr. Hadnagy is one of the key developers of a complimentary resource, social-engineer.org, which discusses many of the book's topic in a framework for social engineering. This book is also the cornerstone of a graduate level course at Bellevue University (Nebraska) named "Human Aspects of Cybersecurity." Bellevue was designated a National Center of Academic Excellence in Information Assurance Education (CAE-IAE) for the academic years of 2012-2017 - indicating just how valuable this resource was to the overall cybersecurity graduate degree program.
Of all the books I've used in my college years, I have kept only about 8-10. This resource is #1 in my list of references and I highly recommend it for anyone curious or concerned about cybersecurity. Humans are the weakest link and it's about time you learned how to mitigate this threat before your security is compromised!
I have also found this book to be particularly stimulating, and indeed even an intellectual curiosity. I believe that Chris is undertaking a sizable social engineering project, in which he is using the opportunity to teach social engineering to actually effect positive and permanent change on the reader (and "coincidentally" enough, this is precisely one of the goals for social engineering that Chris mentions). One can glean that Chris is a master of the art he teaches based on what he has written, and how he has written it. This book itself is a phenomenal experiment in social engineering in which Chris actually helps to make people more caring and empathetic towards others. The idea that one should truly care about others and work on developing true concern, empathy, and listening skill is sprinkled throughout the text in the beginning (pre-loading the reader), and then explicitly declared later on in the guise of becoming a better social engineer. At no point though did I feel as though this message was in any way artificial. It comes across very genuine, and I believe his recommendation truly will make the reader a better social engineer, and a better person. It is clear (to me at least) that Chris is either a psychopathic, wholly evil genius freak who takes pleasure in manipulating others, or he has an amazing understanding of the human mind as a result of his dedication to study and practice, and he truly cares for others and wants to effect positive change in them. I am fully convinced that it is the latter. I believe that a lack of empathy and true compassion is a serious problem in modern society, made worse as technology continues to eliminate the need for physical interaction between people. Chris is clearly using his talents to make the world a better place, and for that I want to thank him heartily.
Interpret this as you will. I have never met Chris and I know nothing about him other than what I've learned from reading his book. If I've been duped then that is a testament to Chris' skill and mastery of the subject. If I haven't been duped, then take my recommendation and buy this book! Even if you aren't looking to make a career in security auditing, this book will help you communicate better in all aspects of your life. (You may even be able to convince your wife to have dinner at that awesome steak joint).