The first book to reveal and dissect the technical aspect of many social engineering maneuvers...
From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real world examples, personal experience, and the Science & Technology behind them to unraveled the mystery in social engineering.
Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
©2011 Christopher Hadnagy (P)2012 Audible, Inc.
Yes, Great book on Social Engineering, Mr Hadnagy go indepth and reviews the techniques used by social engineers to penetrate businesses with some great case studies at the end, esp how the IRS was hacked.. If your into ITSEC, great book to read/listen
The case studies, and the tools and methods explained
Keeps you interested
No, who has the time
Social Engineering is written no better than a giant hacker text that can readily be found over the Internet for free. The author obviously still mixes with hacker circles and appears to have written the book as a way to claim he "literally wrote the book on social engineering."
Chandler drops names like Paul Ekman to show he has taken time to explore research in the field of influence and persuasion. He dedicates a large part of a chapter to Ekman's Facial Action Coding System, but since he has no credentials whatsoever, the reader is expected to take his word that he has developed a proficiency in using it.
He assumes that dropping terms like neurolinguistic programming and microexpressions makes the book somehow all-inclusive, but he does not appear to know of other leading social scientists in the field such as Daniel Kahneman and Robert Cialdini.
Lastly, Chandler repeatedly cites Wikipedia as if it is a valid source for a book. Wikipedia may work for hacker texts but not for professional books. In sum, Chandler provides nothing original whatsoever in the book, cites a few credible sources as if that gives him the credentials, and repeatedly cites Wikipedia.
If you are one of the author's hacker buddies, go read this book. Otherwise, stick to real sources and leave this one alone.
People with too much time on their hands
the chapter on non-verbal cues
Not much interesting content. You'd be better off just reading the website. Writing style is: "here's what I am about to tell you about, here is why I am telling you about it, content, here is what I just told you about".
Nice title too bad the book wasn't about Social Engineering. I felt that the author didn't know what the term Social Engineering was, he decided it was whatever he was talking about at the time. I won't get the time I wasted back and didn't bother finishing it.
offered a refund.
I could have been listening to a different book, by some other author, being read by another narrator.
No. Just this author.
The book was boring enough as-is. The narrator's relentless monotone was not helping.
The whole affair just reeked of an undergraduate sociology paper where the author is primarily interested in "word count." I've written quite a few of these, I just didn't expect the reader to pay for them.
I was hoping for a book that discusses the science and practice of social engineering. This manual details step by step instructions about how to attack a company or person.
Sin taxes, public health campaigns and 401k opt out plans are all examples of how default human behavior can be used to increase government revenue, change risky behaviors and help people save for their retirement. The current administration believes strongly in these measures so I was hoping for a book that discussed them.
However, the author is only interested in detailing how to plan an episode of corporate espionage or identity theft. After an overly long introduction--he spends 75 minutes telling you what he's going to tell you--he lays out the various steps of planning an attack. He litters the trite, cliche-ridden text with phrases like "this would be a good way to get a malicious file on a secretary's computer" or "here's how to trick people into clicking a link that will download a virus."
He tries to deflect criticism by saying he wants people to read the book to understand how they might be vulnerable, but that is clearly not the intent and the book has a sleazy feel to it.
There are no listener reviews for this title yet.
Report Inappropriate Content