The first book to reveal and dissect the technical aspect of many social engineering maneuvers...
From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real world examples, personal experience, and the Science & Technology behind them to unraveled the mystery in social engineering.
Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
©2011 Christopher Hadnagy (P)2012 Audible, Inc.
Media development, video and audio editing, vision and direction.
Very solid story and illustrative explanations on Social Engineering. I would rate this a 9 out of 10 on explanation of the subject matter. Voice acting was pleasant and continued well throughout the audio book.
No real characters as this was more of a manual of methods than a true story, but it did have small stories to illustrate Social Engineering points.
The stories of the 10 million dollar bank heist.
Yes, it was that good. Unfortunately, life gets in the way.
Would like a British female voice as an option to listen to this book. There is just something sexy about that and it compliments the subject.
The book contains very little substance, and subsequently repeats itself without providing value. The author tries to substantiate a generalized approach to social engineering with debunked psychology and flowery language. It's apparent the author has no formal education, and this is just a continuation of what he does for a living, conning people. This book want you to believe social engineering is different than what con men do. It isn't and no amount of contrite language or wrongly applied psych studies will change that. This book is rubbish.
I wanted an introductory book into social engineering, and this book does this job perfectly. There is an explanation of all the sides of the art, and direction for further info if you're interested to dive deeper into anything in particular.
Many examples / real stories makes this listen even easier to follow. Would recommend this audio to anyone.
Additionally, I've discovered that like most people, I was stupid enough to have the same password / user-name on many sites. And how easy it is for anyone (unfriendly, or just bored) to mess up my life. Well, not anymore... or at least not that easy. That alone definitely worth a "credit".
Follow me on Goodreads too!
I first became aware of the concept of Social Engineering when I read “Ghost in the Wires” and I was blown away! It was very exciting – that guy has GUTS!
I wanted to read more about the technique, not necessarily with the goal of learning how to social-engineer people in mind, but rather to try and recognize the signs so I can detect if ever I am being social-engineered!
This book is quite thorough and there is no denying the material is interesting, but I found it too long. There was too much “telling me about what I’m about to read” which I found completely redundant and annoying. Don’t tell me about what you are going to write, just write it and let me read it!!
Aside from that complaint, the book had me hooked.
It's way too full of filler. A good editor could cut out at least 50% of this book.
At the risk of redundancy...make it shorter!
computer like voice.
No. It was really too much "fluff" as it is.
If you are really interested in the topic, you will probably make it through this book...but if you aren't really interested, I'll bet $10 you won't make it all the way through. It's a tough slog at times.
Just very good, that is all, you will learn a lot about how to protect yourself from criminals. Hopefully you're not a criminal reading this book, in this case don't read it little twat.
The whole book was fantastic, but for me, he best part was the in depth mention overview of tactics that referenced the tools used. I'll be spending some time doing research on these as well as speaking to our security team to ensure our audits cover these methods in the future.
Listing on the fly
This book was very eye opening to what can be done to the human mind
When I understood how to intact the principals of the book
Keys to the kingdom
Probably in the distant future, but this book repeated a lot of concepts as it is.
Yes. It's important to keep abreast of how you or your organization can be exploited in the modern world.
All I ask of non-fiction narrators is to present the information as-is without being distracting. I feel like he mostly did that. At times he sounded a bit robotic; this was actually my first Audible audio book, and I initially wondered if they had used a computer program to narrate the book. But I wouldn't say it was distracting. Shoot... sometimes I talk like a robot.
This could totally be some Discovery Channel or TruTV series with no-name actors playing the roles of the malicious social engineers or hired auditors and victims. Kind of like the one crime show called "I Almost Got Away With It."
"YOU MUST READ THIS BOOK... OR YOU WILL DIE"
I'm a security professional, mainly working with computers, but physical security factors a fair bit in my day-to-day activities too. Social Engineering is one of those modern names for the oldest form of attack, something that we are all capable of doing and also capable of falling foul to. Pretexting is used in literature and film all the time to get the story moving; undercover cops, turncoats, spies and double agents, and insider trading are all roles that rely on the ability of the character to engineer social situations to their benefit - and this is no different in real life. The author is a proven expert in social engineering and his involvement in The Real Hustle is testament to his ability to fool people into doing something he wants them to for his benefit. This is not a me me me book, like the Mitnick books in the same genre, instead this really is an exposition of the social science of hacking the human, with all the psychology and rationale explained perfectly for the layman. After reading this you will be better equipped to see through the fraudsters, better engage with salesmen and get the price you want for that rug down the local market. This is a must read if you are in any way interested in this topic, whether as layman or professional. Five stars.
"Human hacking 101 sums it up"
I didn't really know what to expect from this book. In the introduction they say that the book is aimed at the people who have to test security measures for companies and so or people who are just interested to learn about it so they can adjust their security measures, i.e. the 'good ones'. Throughout this book I always felt that this is actually rather a summary of stories how to exploit niceness. The verdict always seemed to be that the key to trick people into doing what the social engineer wanted was by exploiting their niceness, by using the secretary's pity he got her to plug in his malicious USB drive and so on. In the end the message for me was that we all can be tricked by others because we all try to be nice to others.
I thought the book overall was interesting, some of the stories he tells are really fascinating. I did not like the message too much, but I reckon that it is the only conclusion you can draw from his experiences.
"A must-reas for all ethical hackers"
This audiobook present social engineering techniques that should make you question your own security programmes. If you are responsible for securing your organisation then this audiobook should form part of armoury.
Report Inappropriate Content