The first book to reveal and dissect the technical aspect of many social engineering maneuvers...
From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real world examples, personal experience, and the Science & Technology behind them to unraveled the mystery in social engineering.
Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.
©2011 Christopher Hadnagy (P)2012 Audible, Inc.
Media development, video and audio editing, vision and direction.
Very solid story and illustrative explanations on Social Engineering. I would rate this a 9 out of 10 on explanation of the subject matter. Voice acting was pleasant and continued well throughout the audio book.
No real characters as this was more of a manual of methods than a true story, but it did have small stories to illustrate Social Engineering points.
The stories of the 10 million dollar bank heist.
Yes, it was that good. Unfortunately, life gets in the way.
Would like a British female voice as an option to listen to this book. There is just something sexy about that and it compliments the subject.
I wanted an introductory book into social engineering, and this book does this job perfectly. There is an explanation of all the sides of the art, and direction for further info if you're interested to dive deeper into anything in particular.
Many examples / real stories makes this listen even easier to follow. Would recommend this audio to anyone.
Additionally, I've discovered that like most people, I was stupid enough to have the same password / user-name on many sites. And how easy it is for anyone (unfriendly, or just bored) to mess up my life. Well, not anymore... or at least not that easy. That alone definitely worth a "credit".
Just very good, that is all, you will learn a lot about how to protect yourself from criminals. Hopefully you're not a criminal reading this book, in this case don't read it little twat.
It's way too full of filler. A good editor could cut out at least 50% of this book.
At the risk of redundancy...make it shorter!
computer like voice.
No. It was really too much "fluff" as it is.
If you are really interested in the topic, you will probably make it through this book...but if you aren't really interested, I'll bet $10 you won't make it all the way through. It's a tough slog at times.
Member Since 2006!!
I first became aware of the concept of Social Engineering when I read “Ghost in the Wires” and I was blown away! It was very exciting – that guy has GUTS!
I wanted to read more about the technique, not necessarily with the goal of learning how to social-engineer people in mind, but rather to try and recognize the signs so I can detect if ever I am being social-engineered!
This book is quite thorough and there is no denying the material is interesting, but I found it too long. There was too much “telling me about what I’m about to read” which I found completely redundant and annoying. Don’t tell me about what you are going to write, just write it and let me read it!!
Aside from that complaint, the book had me hooked.
Listing on the fly
This book was very eye opening to what can be done to the human mind
When I understood how to intact the principals of the book
Keys to the kingdom
everybody should read this book as introductory entrance to the real world. this way you can better understand how people., collegues, bosses and many people around had manipulating you and will manipulate. knowledge about this make you much more stronger and not get trapped on this.
As a computer scientist the idea of a dedicated discussion on this topic was very interesting, but after a while it started to feel a bit cold and as the author moves from topic to topic the new material lacked that refreshing feeling of moving deeper into the topic. I was not disappointed in the book, the content was there and the techniques are very interesting to me personally so I was able to contend with the simplification of some topics. But after a while the book began to feel like it was repeating the same information in different ways. I had to struggle through the last 2 hours or so. All in all it is worth picking up if the topic interests you, it is also a fantastic reference for someone who does not really understand where the world of information security is these days. I would have loved twice as many stories about actual field encounters and maybe a little less on the ideas of playing someones emotions against them. I get the connection to the con-man mentality, but the author seems to focus a little too hard on this particular aspect, without a clear purpose to the techniques.
A narrator who knows how to read.
Anything narrated by anyone else.
Anyone else. He sounds like he doesn't understand the purpose of punctuation or decides to create his own punctuation wherever he wants. I thought I was listening to the worst and longest movie trailer of all time.
The subject matter is very interesting and insightful. Some of the examples he used aren't great. Would've been a pleasant experience if it didn't have the worst narrator ever.
"YOU MUST READ THIS BOOK... OR YOU WILL DIE"
I'm a security professional, mainly working with computers, but physical security factors a fair bit in my day-to-day activities too. Social Engineering is one of those modern names for the oldest form of attack, something that we are all capable of doing and also capable of falling foul to. Pretexting is used in literature and film all the time to get the story moving; undercover cops, turncoats, spies and double agents, and insider trading are all roles that rely on the ability of the character to engineer social situations to their benefit - and this is no different in real life. The author is a proven expert in social engineering and his involvement in The Real Hustle is testament to his ability to fool people into doing something he wants them to for his benefit. This is not a me me me book, like the Mitnick books in the same genre, instead this really is an exposition of the social science of hacking the human, with all the psychology and rationale explained perfectly for the layman. After reading this you will be better equipped to see through the fraudsters, better engage with salesmen and get the price you want for that rug down the local market. This is a must read if you are in any way interested in this topic, whether as layman or professional. Five stars.
"Human hacking 101 sums it up"
I didn't really know what to expect from this book. In the introduction they say that the book is aimed at the people who have to test security measures for companies and so or people who are just interested to learn about it so they can adjust their security measures, i.e. the 'good ones'. Throughout this book I always felt that this is actually rather a summary of stories how to exploit niceness. The verdict always seemed to be that the key to trick people into doing what the social engineer wanted was by exploiting their niceness, by using the secretary's pity he got her to plug in his malicious USB drive and so on. In the end the message for me was that we all can be tricked by others because we all try to be nice to others.
I thought the book overall was interesting, some of the stories he tells are really fascinating. I did not like the message too much, but I reckon that it is the only conclusion you can draw from his experiences.
"A must-reas for all ethical hackers"
This audiobook present social engineering techniques that should make you question your own security programmes. If you are responsible for securing your organisation then this audiobook should form part of armoury.
Report Inappropriate Content