Social Engineering the Art of Human Hacking Spark Notes

,
Open up Preview

See a Problem?

We'd honey your assistance. Allow united states know what's incorrect with this preview of Social Engineering by Christopher Hadnagy.

Thanks for telling u.s. nigh the problem.

Friend Reviews

To meet what your friends thought of this volume, please sign up.

Community Reviews

 · two,850 ratings  · 198 reviews
Start your review of Social Engineering: The Art of Human being Hacking
Todd
Mar 30, 2011 rated it it was ok
Let me outset by proverb that Social Engineering science is i of the ii areas of data security where I have specialized (in improver to awarding security), and so I was looking forward to this book, and, undoubtedly, I set my expectations besides highly.

Hither is a big part of where my excitement originated: this book is one of the first books to pull together commentary on the types of things social engineers have known and been doing. This book, every bit well as social-engineer.org and _No Tech Hacking_ ar

Let me commencement by saying that Social Applied science is i of the ii areas of information security where I take specialized (in addition to awarding security), so I was looking forward to this book, and, undoubtedly, I set my expectations also highly.

Hither is a large part of where my excitement originated: this book is one of the first books to pull together commentary on the types of things social engineers take known and been doing. This volume, as well equally social-engineer.org and _No Tech Hacking_ are substantially pioneers at getting these techniques, tips, and tactics nerveless across an anecdotal way.

That said, information technology was badly put together:

* Numerous assertions were not fact-checked (some having been repeatedly debunked)
* The audience wasn't clear, and seemed to mutate
* Commentary meandered, went off-topic, and even repeated itself in unhelpful ways
* The use of quotes, anecdotes, and studies seemed haphazard
* Long web links were written out in the books, instead of shortened ones
* etc.

For most of the above, I tin't totally blame the author, who was coming to this as a Social Technology bailiwick matter expert, not a author, but the publisher or editor should take been on top of those things.

What was probably most frustrating virtually the aforementioned items, yet, is that the volume could spend and so much fourth dimension on the arts of persuasion, and fully fail to execute them in text.

As far as the content (assuming an editor or ghost-writer could have given it flow and cohesion), most of the information was 5-15+ years onetime. To be fair, however, this is non totally an indictment of the book, only besides the security industry as a whole, which is primarily an artifact of our commonage tendency to revel in our exploits rather than put effort and attending into addressing the problems that lead to easy social engineering (or other security) exploits. (Note: this trend is repeated in this book, too, with 24 of 382 pages being well-nigh "Prevention and Mitigation").

In the end, this volume was due dorsum at the library, so, while I read over one-half of it, I ended up skimming the residue. It wasn't worth checking out, once again.

...more
Bradley
May 24, 2020 rated it actually liked information technology
This is a pretty good white-lid breakdown of techniques that exploit the more than psychological aspects of hacking.

Indeed, while it does become into some really decent particular focusing on awareness of methods, it really shines in highlighting how ane might become into business equally an Accountant, themselves.

All in all, it is the modern confidence game. You've got thieves and thief-takers. You've got an amazing variety of people out in that location that simply don't accept enough precautions so y'all've got others that

This is a pretty good white-hat breakdown of techniques that exploit the more psychological aspects of hacking.

Indeed, while it does go into some really decent particular focusing on sensation of methods, it really shines in highlighting how one might go into business organisation as an Auditor, themselves.

All in all, it is the modernistic confidence game. You've got thieves and thief-takers. You've got an amazing variety of people out there that but don't take plenty precautions and and so y'all've got others that aren't paying close enough attending to the Correct kind of precautions.

Tin you lot imagine having a multi-one thousand thousand dollar security system, teams of devoted security analysts, a fort-knox door, good key cards, and an excellent magnetic lock... all foiled by waving a t-shirt? Or because you lot helped a secretary out by alert her of her bad-mood boss... or past being an all-correct guy helping y'all out of a jam?

Only these kinds of things happen all the time. We've all heard of fishing. We know non to open untrusted pdf files. We know that we demand to keep our software updated and relatively better protected from old exploits. Correct? Well, apparently not. Social creatures do as social creatures practice. People who help yous out of jams or mirror your expressions or announced out of nowhere with official-sounding titles and excellent business cards are ever... TRUSTED. Someone with a CFO title demands that yous do something or lose your job. What do you do?

The thing is, most businesses set themselves up for this kind of chicanery. If you instill respect and/or fright in your employees, don't be surprised when someone from the outside exploits the natural human reactions that come up with being mistreated and/or indoctrinated. Being complimentary to ask questions and verify credentials should be encouraged... even when an angry CFO keeps threatening an employee. (Real or non existent, the terms of appointment ought to be the same.)

Alas. There's a lot more similar this in the book and it'southward all pretty fascinating. It helps to exist a genuine people person if you get into this line of work, simply there are lots of different kinds of techniques. The point is to have a well-rounded toolbox and display confidence. Because you're a white-hat... right?

...more
Simone
Nov 23, 2012 rated it liked it
I kickoff became enlightened of the concept of Social Applied science when I read Ghost in the Wires My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick and I was diddled away! It was very exciting – that guy has GUTS!

I wanted to read more about the technique, non necessarily with the goal of learning how to social-engineer people in mind, just rather to endeavour and recognize the signs so I can detect if ever I am being social-engineered!

This book is quite thorough and there is no denying the textile is interesting, but I found it too long. There was too much "telling me about

I first became aware of the concept of Social Technology when I read Ghost in the Wires My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick and I was blown away! Information technology was very exciting – that guy has GUTS!

I wanted to read more about the technique, not necessarily with the goal of learning how to social-engineer people in mind, simply rather to attempt and recognize the signs and then I can detect if ever I am being social-engineered!

This book is quite thorough and there is no denying the material is interesting, just I found it besides long. At that place was also much "telling me about what I'thou about to read" which I found completely redundant and annoying. Don't tell me near what you lot are going to write, just write information technology and let me read it!!

Aside from that complaint, the book had me hooked.

...more than
Sebastian Gebski
3-iii.5 stars.
Book contains plenty of useful information, merely I didn't like it at all ;/

Why?
1. Narrator in Audible version was far likewise monotonous & fabricated fifty-fifty the nearly interesting cases sound dull.
2. Book is too repetitive, while in the same time information technology lacked clear structure -> this deepens the feeling of repetition
three. Author does a lot of 'cheap' NLP on the reader -> to easy to look through & too abrasive ("next, you lot'll read about the all-time & nearly fascinating techniques of influence and manipulation th

3-iii.5 stars.
Book contains enough of useful information, but I didn't like information technology at all ;/

Why?
one. Narrator in Audible version was far likewise monotonous & made even the most interesting cases sound slow.
2. Volume is also repetitive, while in the aforementioned time it lacked clear construction -> this deepens the feeling of repetition
three. Author does a lot of 'cheap' NLP on the reader -> to easy to await through & too abrasive ("next, y'all'll read about the best & most fascinating techniques of influence and manipulation that will blow your listen!!!" - sort-of-mode)
4. Author ain't merely inspired by classics, he explicitly quotes techniques & even total cases (!) - e.chiliad. from Mittnick's "Art of Deception". Well, he doesn't hide it (quite the contrary), merely it also means that if you've read Cialdini, Mittnick & some NLP stuff, you won't find anything really new (or refreshing) here.

And then, if you haven't read annihilation on SE until now, it's a good starter - easy ready, comprehensive plenty, very practical. Sometimes confusing (author can't decide whether information technology's supposed to serve white-hack SEs or individuals who should raise their awareness), but still useful. If you lot've already read something OR you want to start with more comprehensive psychological approach, start with Cialdini ("Influence" should become outset).

...more
Trav
February 03, 2013 rated information technology it was ok
An easy read.

The audience is non clear, but I do not believe information technology needs to exist. The fact that the author repeatedly talks throughout about techniques you can use to social engineer, merely then closes the book out with a chapter on "Prevention and Mitigation" highlighted, to me, that the book was designed more than as a wake-up call to those, like the CEO he mentions in 1 of his case study, that believe themselves immune from the potentially negative effects of social applied science.

I find it interesting

An like shooting fish in a barrel read.

The audience is not clear, but I do not believe it needs to exist. The fact that the writer repeatedly talks throughout almost techniques you can utilize to social engineer, but and so closes the book out with a chapter on "Prevention and Mitigation" highlighted, to me, that the book was designed more equally a wake-up call to those, like the CEO he mentions in one of his example study, that believe themselves immune from the potentially negative effects of social engineering.

I observe it interesting that the author talks at length well-nigh the use of cloned sites and the employ of malicious code on websites as a tool for the social engineer, and then directs the reader to specific sites, and .pdf files throughout the book. I am non sure if I am imputing also much to the author's strategy in writing the book, but the willingness to expect at those websites and notice those .pdfs to be an interesting case of social engineering in and of itself.

In summ: the volume was depressingly informative and idea provoking. I think that it does offer an effective wake-up telephone call, but can too accept the result of making those prone to paranoia flip-out.

I also note the irony of writing a review of a social engineering book on a website which in turn is an artery for social applied science.

...more
Aija
Mar xiv, 2011 rated it liked it
A typical american-way book - too much repetition and redundancy of words.
Other than that, information technology is a nice systematic review of social engineering methods.
And while reading this volume I realized why we shouldn't share every bit of information about ourselves in social networks (information technology's non similar I didn't know it, but now I understand it). However, not sharing information on social networks besides is information that can be used, and so I conclude with same equally the writer: security through instruction. Demand to
A typical american-style book - likewise much repetition and back-up of words.
Other than that, it is a nice systematic review of social engineering methods.
And while reading this volume I realized why we shouldn't share equally of information about ourselves in social networks (it's not similar I didn't know it, only now I understand it). Withal, non sharing information on social networks also is data that tin be used, and so I conclude with aforementioned every bit the author: security through education. Need to be aware of this.
...more
Amir Tesla
This books contains the basic principles of South.Due east. The very downside of it though, is that the information provided in each domain is too trivial. In one case y'all hitting a new affiliate and accept a glance at the title you would say wow it must be very interesting only as you proceed forth the content you become disappointed since many things stays opaque.
There are introduced interesting topics that tin exist used in an SE process similar elicitation, framing, persuasion techniques, NLP etc. simply you cannot grasp the who
This books contains the basic principles of South.Eastward. The very downside of it though, is that the information provided in each domain is too picayune. One time you hitting a new chapter and accept a glance at the championship y'all would say wow information technology must be very interesting simply as you go on along the content yous get disappointed since many things stays opaque.
In that location are introduced interesting topics that can be used in an SE procedure like elicitation, framing, persuasion techniques, NLP etc. but y'all cannot grasp the whole idea by reading the corresponding topic in the book and you lot must refer to a more strong book in that regard.
I would recommend this book a very basic introduction and guideline to those who are interested in SE.
...more than
Ryan
This volume is far from perfect, but it is the best book I've institute on how-to social engineering as an overall field vs either a bunch of example studies or narrow guides to specific techniques. The biggest problem was using the same set of examples to illustrate multiple ostensibly distinct techniques — absolutely a lot of the distinctions were arbitrary to begin with — and the structure of the book wasn't as clear as it could be. Even so, this book (and the author's other resources on the Cyberspace) This volume is far from perfect, but it is the best book I've found on how-to social engineering equally an overall field vs either a bunch of case studies or narrow guides to specific techniques. The biggest trouble was using the same prepare of examples to illustrate multiple ostensibly singled-out techniques — absolutely a lot of the distinctions were arbitrary to begin with — and the structure of the book wasn't as clear as information technology could be. Yet, this book (and the author'south other resource on the Internet) are bully resources for interested individuals, not-SE security people, or administrators. ...more
Vlad
Nov nineteen, 2017 rated information technology liked it
Decent book if this is one's first interaction with the topic. If not, the repetitive, meandering and occasionally off-topic commentary coupled with a hefty amount of outdated information, plus the long internet links thrown in together with the text, instead of in an appendix, will make it a difficult read at times.
With these shortcomings aside, I did appreciate the topics on information gathering, microexpressions, the description of Kali Linux'southward (still called Backtrack when the book was writt
Decent book if this is one's beginning interaction with the topic. If not, the repetitive, meandering and occasionally off-topic commentary coupled with a hefty amount of outdated information, plus the long cyberspace links thrown in together with the text, instead of in an appendix, will make it a hard read at times.
With these shortcomings aside, I did appreciate the topics on information gathering, microexpressions, the description of Kali Linux'south (yet called Backtrack when the book was written) tools that are oriented towards social engineering, and some of the instance studies.
...more
Soukyan Blackwood
all reviews in 1 place:
night mode reading ;
skaitom nakties rezimu

Most the Volume: What information you have on your social media profiles? Are at that place pictures of your home there, your family unit? Is the name there – existent? And so if I chosen you to ask well-nigh your bank details, knowing your name, and your banking company, how would you lot know I'm not in it for your life savings if I, seemingly, asked nothing of value?… When's the concluding time yous did one of those "tag a friend" things that ask you for v facts

all reviews in ane identify:
dark mode reading ;
skaitom nakties rezimu

Nigh the Book: What information you have on your social media profiles? Are at that place pictures of your abode there, your family? Is the name there – real? Then if I called yous to ask about your bank details, knowing your proper noun, and your depository financial institution, how would you know I'm not in information technology for your life savings if I, seemingly, asked goose egg of value?… When's the last time you did one of those "tag a friend" things that ask yous for five facts, your favorite color, food, drinkable? Do you lot employ the countersign you apply in that profile – somewhere else as well? When's the final time you updated it? And is your security question – the easiest one to remember?…

My Stance: A genuinely brilliant book that is likewise very concerning. Us the humans are easy to dispense. A drop of empathy here, a fleck of solidarity there, an instilled respect or fearfulness of government, and we don't question things. Think you can read people, and have a dandy gut feeling? Read it. The only consequence I had with information technology was the pronouns used. An instance is given where the abstract state of affairs contains a person. We are led into it to "meet" this person. so suddenly that person obtains a gender. So now that you lot see this person, wait her in the eyes. I was okay with them being a person, don't brand me plough the person into someone more specific mid-judgement, delight.

...more
Kārlis Bergmanis
I agree with school of thought that states "Homo is the weakest link in cyber security concatenation." In almost cases information technology's much easier to just enquire for password nicely and get it than to interruption open OS, so account, then database, then bank etc. Or why ask password, if y'all tin can merely ask for coin or documents themselves?
So logically defence should start with sensation and preparation, and non simply of Information technology personnel, simply everyone - since in 21st Century nosotros all have digital presence.
This a expert overview of metho
I concur with school of idea that states "Human is the weakest link in cyber security chain." In nigh cases it'south much easier to merely enquire for password nicely and go it than to break open up Os, then business relationship, then database, then banking concern etc. Or why ask password, if you can just ask for money or documents themselves?
So logically defense should starting time with awareness and preparation, and non only of IT personnel, just everyone - since in 21st Century we all have digital presence.
This a skilful overview of methods and attack vectors - and exactly that, "overview", considering to go social engineer 1 should add some years of practice to the book itself.
Information technology as well made me consider what I would consider social engineering, considering, in a manner, some of the elements are relevant to whatever communication - rapport, empathy, careful listening etc.
...more
Abbas
Mar 17, 2018 rated information technology it was amazing
Arm yourself with cognition.

This book looked to me similar it has broke human relations down into fine pieces and made information technology easy to understand. The book bases its arguments on reasearch the author's team and other psychologists have conducted as well equally public experiments and events. The one affair this book was, to me, lacking was examples from history.

Arm yourself with noesis.

This book looked to me like information technology has broke human relations down into fine pieces and made it piece of cake to empathize. The book bases its arguments on reasearch the author'due south team and other psychologists accept conducted as well as public experiments and events. The 1 thing this volume was, to me, lacking was examples from history.

...more than
Martijn Reintjes
People are so hands manipulated.
I believe it'south good to be aware of information technology and then it won't happen so hands to you.
People are so easily manipulated.
I believe information technology's expert to be enlightened of information technology so it won't happen and so easily to you.
...more
vadász szőlő
Oct xi, 2018 rated it it was amazing
I found that this book is vary interesting. Subsequently reading this book I watched the Television show that the author made about the aforementioned matter. Wile reading this book I learned about social engineering science and how to utilise and manipulate people using the tactics used in the volume. The book also is a proficient matter to larn about to protect your self from the people trying to hurt or scam me using the tactics in the book.
This book shows how to brand people do what you want to practise, wile likewise making them think i
I found that this book is vary interesting. Afterward reading this volume I watched the Television set show that the author made about the aforementioned thing. Wile reading this book I learned near social engineering and how to utilize and dispense people using the tactics used in the book. The book also is a good thing to learn about to protect your cocky from the people trying to hurt or scam me using the tactics in the book.
This book shows how to make people exercise what you want to practice, wile also making them think its their idea and to make them call up that it will also benefit them, only actually is putting them at a disadvantage on them. Giving me or the attacker the advantage. The volume also shows how to infiltrate corporations to get data. From reading this book Information technology has showed me the low-cal in the nighttime and now when I grow upward I want to use use this info in a job in the future. This book has sparked a interest in me to fine more nigh social engineering science every bit a hobby and equally a job. I will only apply this volume information to practice good and not for evil entente.
I exist leave everyone should read this book. It shows how to protect your self from people who want to harm you lot past showing how to prevent it. To go along your information, and possibly company safe from harms style.

"If you know the enemy and know yourself you need
not fear the results of a hundred battles.
—Sunday Tzu (Page 25)"

"War is ninety percent data.
—Napoleon Bonaparte (Page 47)"

...more
Sal Coraccio
A well washed overview with added depth in key areas - overall, an fantabulous resource for whatever Information technology professional and volition provide utility for a penetration tester looking to strengthen the person-to-person set on vector.

This volume is probably all-time served as newspaper, versus audio - or at least supplemented with the actual book. This is partly due to the many lists and references and partly due to the off-putting narration. Information technology wasn't bad, but "good" isn't quite the right word either.

This book and farther

A well washed overview with added depth in cardinal areas - overall, an excellent resources for any IT professional and will provide utility for a penetration tester looking to strengthen the person-to-person attack vector.

This book is probably all-time served as paper, versus sound - or at least supplemented with the bodily book. This is partly due to the many lists and references and partly due to the off-putting narration. It wasn't bad, merely "practiced" isn't quite the right discussion either.

This volume and farther written report (and practice) in the areas outlined are a means to becoming a more effective Penetration tester.

To the accusers that Hadnagy is presenting tools for manipulation, and criticizing him for that... you are missing the point. Attackers volition apply any means; ethical or not, to infiltrate a company'south infrastructure. NLP, framing, microexpressions - all of the tools and techniques covered in this book. And they will apply others merely partly best-selling in this book, such as blackmail and other means of social leverage. Understanding that "manipulating" humans is common in this field is vital to defence force confronting them.

It is ironic that nigh people are manipulated on a daily ground past advertisers and governments, nonetheless can't come to terms with the methods in the context of information security. This isn't conspiracy theory - information technology is business.

Anyway - keen volume for agreement the challenges of IT security, particularly for the understanding of human vulnerabilities in social club to deliver network infiltration devices and software.

...more
Liz Mclean-Knight
This is a pretty good into to SE, and some nice anecdotes are thrown in forth the way. If you've already been studying the topic, a lot of information technology is redundant but I tin can encounter it being a nice thing to take one'south employees read in order to take SE seriously equally a security issue. He touches on microexpressions and Neurolinguistic Programming (NLP) in deceptive conversations, but these are very surface-level discussions. Here are a few resources I've establish on various subjects that are more deep-dives:

Trunk

This is a pretty skillful into to SE, and some nice anecdotes are thrown in forth the mode. If you've already been studying the topic, a lot of information technology is redundant only I tin can encounter it beingness a nice affair to take one's employees read in order to take SE seriously as a security issue. He touches on microexpressions and Neurolinguistic Programming (NLP) in deceptive conversations, but these are very surface-level discussions. Here are a few resources I've plant on various subjects that are more deep-dives:

Body Language
What Every BODY is Saying - Navarro [Good intro]
The Definitive Book of Body Language - Pease [A visual glossary]
Body Linguistic communication Success [Analyzing trunk language and microexpressions in news and celebrity video clips]

Persuasion
Never Carve up the Difference - Voss [Negotiating]
Get Anyone to Do Anything - Lieberman
The Science of Influence - Hogan
How to Talk to Anyone - Lownders [Rapport, charisma]

Neuolinguistic Programming
NLP Workbook - O'Connor
Pitch Anything - Klaff

Concrete Tools
How to Open Locks with Improvised Tools - Konkel

Social Engineering
The Fine art of Deception - Mitnick [SE scripts and anecdotes]

...more
Mike
Aug 02, 2017 rated information technology it was ok
I picked up the book with the intent of learning more than about Social Applied science and how I could defend confronting bad actors. It sounded similar the author knew his subject area and was sharing.

Just the author needs a improve editor. The focus of the book wanders, so that on the same folio the tone is for a person like me and and so a couple paragraphs subsequently, someone who wants to be a social engineering auditor. I'd be fine either way, but the constant flopping effectually made for difficult reading. (The biggest omi

I picked up the book with the intent of learning more almost Social Applied science and how I could defend against bad actors. It sounded like the author knew his subject field and was sharing.

But the author needs a better editor. The focus of the book wanders, so that on the same folio the tone is for a person like me and and then a couple paragraphs later, someone who wants to be a social engineering auditor. I'd be fine either style, but the abiding flopping around made for difficult reading. (The biggest omission is in the first the text states there is an appendix, but there isn't)

The stories are the best role, though there isn't a solid narative to support them. Tidbits spring upward out of nowhere, then are non connected to the next page. I call back a lot could have been discussed effectually is numerous educational stories. That would have been much meliorate.

In the end, I learned virtually the author's website and the surface of social engineering. This could be seen as a primer, but it doesn't have the cohesiveness. (I'm non knocking the fact it is 6 years sometime, for me, and a lot of the data could be out of engagement).

...more
Jonathan Jeckell
While the United states authorities is fixated with all things cyber, this book shows how physical and technical security systems tin can easily be bypassed. It mainly trends to following professional penetration testers, but too provided insight into improving your power to influence others, every bit well as protect yourself from predatory manipulation, similar hoaxes, scams, spear phishing, etc. The part virtually how woefully inadequate almost corporate information sensation courses are fabricated me laugh out loud since it p While the US government is fixated with all things cyber, this book shows how physical and technical security systems can easily be bypassed. It mainly trends to following professional penetration testers, but also provided insight into improving your power to influence others, also as protect yourself from predatory manipulation, similar hoaxes, scams, spear phishing, etc. The part about how woefully inadequate most corporate information awareness courses are made me express joy out loud since it pretty much nailed U.s. DoD's abysmally ho-hum and useless marathon that near people simply click through. It provided very savvy advice on how to provide your organization with constructive information assurance training. ...more
Weston
Mar 10, 2011 rated information technology it was amazing
This was an first-class book. Normally, I don't read books similar this one cover to cover. I browse through them, looking at interesting parts, and so they sit on my shelf until I want to reference something in them. That well-nigh happened with this volume. I read well-nigh one-half way through information technology back in March, and so started reading another things. Virtually a week agone, I picked it support and had a hard fourth dimension putting it downwardly. The explanations in the volume are bully, and the material is fascinating. It is sc This was an excellent book. Unremarkably, I don't read books similar this one encompass to cover. I browse through them, looking at interesting parts, and and so they sit on my shelf until I desire to reference something in them. That almost happened with this book. I read about half style through it back in March, so started reading some other things. About a week agone, I picked it back upwardly and had a hard time putting it downwards. The explanations in the volume are great, and the cloth is fascinating. It is scary how easily people requite out information. I would definitely recommend this book to anyone interested in social engineering, or influence/manipulation. ...more than
Dark Ness
three Stars.

Why? - Because there are some ''cool'' ideas almost how to influence and dispense people and some software suggested. The beginning half of the book was ok but the second ane was awful! I even skipped the last 30 sheets, it was and then deadening!

Also, the World DOESN'T work like that - yous CAN'T just call the police officers and tell them ''i'm a detective then please requite me the Jhon Doll's Security Number...NOW! ''.
You can't ''hack'' computers so easily besides, we don't live in the 90'.

Plain,

three Stars.

Why? - Considering there are some ''cool'' ideas almost how to influence and dispense people and some software suggested. The first half of the volume was ok but the second one was atrocious! I even skipped the last 30 sheets, it was so tiresome!

Also, the World DOESN'T work similar that - you lot CAN'T simply phone call the police force officers and tell them ''i'chiliad a detective so delight requite me the Jhon Doll'south Security Number...NOW! ''.
You can't ''hack'' computers so easily too, we don't live in the 90'.

Evidently, the volume was written for the boilerplate Joe who ''needs'' to be educated almost the dangerous Information technology World.

Afterward all the book is poorly written and slow in fact.

...more than
R.Z.
Jul 30, 2011 rated information technology did not similar it
Christopher Hadnagy's worldview is suspect. Under the guise of showing his readers how to prevent falling casualty to shysters trying to defraud them, he is really education his readers how to manipulate and fool people into doing what is wanted. Once again and once again he exhorts his readers to not break the police, nevertheless much of what he recommends would exist considered unethical and immoral by anyone who believes in respect for others. Bad stuff. Christopher Hadnagy'due south worldview is suspect. Nether the guise of showing his readers how to prevent falling prey to shysters trying to defraud them, he is really didactics his readers how to manipulate and fool people into doing what is wanted. Once again and again he exhorts his readers to not break the police force, still much of what he recommends would be considered unethical and immoral by anyone who believes in respect for others. Bad stuff. ...more than
Takedown
Aug 29, 2011 rated it it was amazing
This book just amazing!!!
And so much valuable information, very fun and easy to read! Priceless!
Must read if you do security audit or but interested in social engineering!
This is besides ane of the all-time psychological volume so worth a expect even if you not interested in IT
Joycec
December thirteen, 2011 rated it actually liked it
This book gives a good overview of how we go hacked and/or taken advantage of. Information technology'south great insight into how trusting we can be and how others can use this to exploit usa. There are parts that are way likewise technical for almost of us but overall the book was worth reading. This book gives a proficient overview of how we get hacked and/or taken advantage of. It's not bad insight into how trusting we tin can be and how others tin can utilize this to exploit us. There are parts that are fashion besides technical for near of the states but overall the book was worth reading. ...more than
Douglas Matthews
Chris Hadnagy provides an first-class primer into the world of social engineering. If you lot desire to understand the threat, larn to think how the bad guys recollect. Plus, there are many aspects of social engineering that have perfectly legitimate uses and purposes in ordinary personal and business organisation life.
Jamison Moore
Disappointing, and lacking whatever real substance past the first few chapters. If you've never heard the term "social engineering" and then this might be a proficient read if you're tired of your Information technology cert grooming manuals, but otherwise, become read "Burglar's Guide to the Metropolis." Disappointing, and lacking any real substance by the first few chapters. If yous've never heard the term "social engineering" and so this might be a adept read if you're tired of your IT cert training manuals, just otherwise, get read "Burglar's Guide to the City." ...more
Dan
Mar twenty, 2011 rated it information technology was amazing
I thought "Fine art of Deception" was the best book out in that location on the discipline of social engineering, and so I read this.... Outstanding. I idea "Art of Deception" was the all-time book out there on the subject of social engineering, and so I read this.... Outstanding. ...more
John
February xiii, 2012 rated information technology liked information technology
Interesting, but way too credulous on the NLP nonsense.
Jose
Apr 11, 2015 rated information technology really liked it
Not bad. Information technology was non a academical as I was thinking at beginning, it was more on the entertaining side.
Georgi Bg
Feb ten, 2019 rated it it was astonishing
This volume shows you how easy we tin can be "hacked" and gives us lots of examples, to be with our eyes wide open all the fourth dimension. This book shows you how easy we tin can be "hacked" and gives us lots of examples, to be with our eyes wide open all the time. ...more

Goodreads is hiring!

If you similar books and love to build cool products, we may be looking for you.
Learn more than »

News & Interviews

Demand some other excuse to treat yourself to a new book this calendar week? Nosotros've got you covered with the buzziest new releases of the day. To create our...
"I found, for myself, the ability to be observant proved to exist easier for me afterward receiving some training from Dr. Ekman in microexpressions. I institute afterwards that not only did I become much more enlightened of what was going on with those around me, but also myself. When I felt a certain expression on my face up, I was able to analyze it and see how it might be portrayed to others. This recognition of myself and my surroundings was one of the most enlightening experiences of my life." — 3 likes
"Johnny Long wrote a famous volume chosen Google Hacking for Penetration Testers and really opened upwards many people's eyes to the amazing amount of information that Google holds." — i likes
More quotes…

Welcome dorsum. Only a moment while we sign yous in to your Goodreads account.

Login animation

murphythour1956.blogspot.com

Source: https://www.goodreads.com/book/show/9068044-social-engineering

0 Response to "Social Engineering the Art of Human Hacking Spark Notes"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel