Social engineering the art of human hacking

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Hadnagy, Christopher (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Indianapolis, Ind. Wiley 2011
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV036897519
003 DE-604
005 20150508
007 t
008 110112s2011 a||| |||| 00||| eng d
020 |a 0470639539  |c pbk  |9 0-470-63953-9 
020 |a 9780470639535  |c pbk  |9 978-0-470-63953-5 
035 |a (OCoLC)706860220 
035 |a (DE-599)HBZHT016648882 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-473  |a DE-92  |a DE-83  |a DE-863  |a DE-91G 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a DAT 055f  |2 stub 
100 1 |a Hadnagy, Christopher  |e Verfasser  |0 (DE-588)143224042  |4 aut 
245 1 0 |a Social engineering  |b the art of human hacking  |c Christopher Hadnagy 
264 1 |a Indianapolis, Ind.  |b Wiley  |c 2011 
300 |a XIX, 382 S.  |b Ill. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
650 0 7 |a Social Engineering  |g Sicherheit  |0 (DE-588)7539699-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenschutz  |0 (DE-588)4011134-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Soziologie  |0 (DE-588)4077624-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Sozialtechnologie  |0 (DE-588)4181997-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Manipulation  |0 (DE-588)4037348-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
653 |a Social engineering. 
653 |a Computer security. 
653 |a Human-computer interaction. 
689 0 0 |a Social Engineering  |g Sicherheit  |0 (DE-588)7539699-3  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Sozialtechnologie  |0 (DE-588)4181997-4  |D s 
689 0 3 |a Manipulation  |0 (DE-588)4037348-4  |D s 
689 0 |5 DE-604 
689 1 0 |a Soziologie  |0 (DE-588)4077624-4  |D s 
689 1 1 |a Datenschutz  |0 (DE-588)4011134-9  |D s 
689 1 |8 1\p  |5 DE-604 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-1-118-02801-8 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-1-118-02971-8 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-1-118-02974-9 
856 4 2 |m Digitalisierung UB Bamberg  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020812588&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-020812588 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 

Datensatz im Suchindex

DE-473_call_number 61/ST 277 WX 58857
DE-473_location 6
DE-BY-863_location 1000
DE-BY-FWS_call_number 1000/ST 277 H131 S6
DE-BY-FWS_katkey 530549
DE-BY-FWS_media_number 083101333947
083101326404
DE-BY-TUM_call_number 0102/DAT 055f 2015 A 2604+2
0102/DAT 055f 2015 A 2604
DE-BY-TUM_katkey 2111132
DE-BY-TUM_media_number 040008205363
040008062019
DE-BY-UBG_katkey 2750476
DE-BY-UBG_media_number 013107505625
_version_ 1816714111076007936
adam_text CONTENTS Foreword ..............................................................xiii Preface and Acknowledgments ...........................................xvii 1 A Look into the World of Social Engineering .......................1 Why This Book Is So Valuable .............................................3 Overview of Social Engineering ...........................................9 Summary ..............................................................21 і Information Gathering .........................................23 Gathering Information ..................................................26 Sources for Information Gathering .......................................33 Communication Modeling ...............................................43 The Power of Communication Models ....................................53 i Elicitation ....................................................55 What Is Elicitation? .....................................................56 The Goals of Elicitation ..................................................58 Mastering Elicitation ....................................................74 Summary ..............................................................76 4 Pretexting: How to Become Anyone .............................77 What Is Pretexting? .....................................................78 The Principles and Planning Stages of Pretexting ...........................79 Successful Pretexting ...................................................91 Summary ..............................................................99 5 Mind Tricks: Psychological Principles Used in Social Engineering .. 101 Modes of Thinking .....................................................103 Microexpressions ......................................................109 Neurolinguistic Programming (NLP) ....................................136 Interview and Interrogation .............................................143 Building Instant Rapport ...............................................162 The Human Buffer Overflow ............................................172 Summary .............................................................178 Χ» CONTENTS Influence: The Power of Persuasion .............................181 The Five Fundamentals of Influence and Persuasion .......................182 Influence Tactics ......................................................187 Altering Reality: Framing ...............................................215 Manipulation: Controlling Your Target ...................................233 Manipulation in Social Engineering .....................................248 Summary ............................................................256 The Tools of the Social Engineer ...............................259 Physical Tools ........................................................260 Online Information-Gathering Tools ....................................279 Summary .............................................................297 Case Studies: Dissecting the Social Engineer ..................299 Mitnick Case Study 1: Hacking the DMV ...............................300 Mitnick Case Study 2: Hacking the Social Security Administration .........306 Hadnagy Case Study 1: The Overconfident CEO ...........................310 Hadnagy Case Study 2: The Theme Park Scandal ..........................317 Top-Secret Case Study 1: Mission Not Impossible .........................322 Top-Secret Case Study 2: Social Engineering a Hacker .....................329 Why Case Studies Are Important ........................................337 Summary ............................................................338 Prevention and Mitigation .....................................339 Learning to Identify Social Engineering Attacks ..........................340 Creating a Personal Security Awareness Culture .........................341 Being Aware of the Value of the Information You Are Being Asked For .....344 Keeping Software Updated .............................................347 Developing Scripts ....................................................348 Learning from Social Engineering Audits ................................348 Concluding Remarks ..................................................354 Summary .............................................................361 Index .................................................................363
any_adam_object 1
author Hadnagy, Christopher
author_GND (DE-588)143224042
author_facet Hadnagy, Christopher
author_role aut
author_sort Hadnagy, Christopher
author_variant c h ch
building Verbundindex
bvnumber BV036897519
classification_rvk ST 276
ST 277
classification_tum DAT 055f
ctrlnum (OCoLC)706860220
(DE-599)HBZHT016648882
discipline Informatik
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02391nam a2200565zc 4500</leader><controlfield tag="001">BV036897519</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150508 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110112s2011 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470639539</subfield><subfield code="c">pbk</subfield><subfield code="9">0-470-63953-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470639535</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-470-63953-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706860220</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT016648882</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143224042</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering</subfield><subfield code="b">the art of human hacking</subfield><subfield code="c">Christopher Hadnagy</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 382 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sozialtechnologie</subfield><subfield code="0">(DE-588)4181997-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Manipulation</subfield><subfield code="0">(DE-588)4037348-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Social engineering.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Human-computer interaction.</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sozialtechnologie</subfield><subfield code="0">(DE-588)4181997-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Manipulation</subfield><subfield code="0">(DE-588)4037348-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Soziologie</subfield><subfield code="0">(DE-588)4077624-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-02801-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-02971-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-02974-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=020812588&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020812588</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection>
id DE-604.BV036897519
illustrated Illustrated
index_date 2024-09-19T15:27:00Z
indexdate 2024-11-25T17:51:13Z
institution BVB
isbn 0470639539
9780470639535
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-020812588
oclc_num 706860220
open_access_boolean
owner DE-473
DE-BY-UBG
DE-92
DE-83
DE-863
DE-BY-FWS
DE-91G
DE-BY-TUM
owner_facet DE-473
DE-BY-UBG
DE-92
DE-83
DE-863
DE-BY-FWS
DE-91G
DE-BY-TUM
physical XIX, 382 S. Ill.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Wiley
record_format marc
spellingShingle Hadnagy, Christopher
Social engineering the art of human hacking
Social Engineering Sicherheit (DE-588)7539699-3 gnd
Datenschutz (DE-588)4011134-9 gnd
Soziologie (DE-588)4077624-4 gnd
Sozialtechnologie (DE-588)4181997-4 gnd
Manipulation (DE-588)4037348-4 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)7539699-3
(DE-588)4011134-9
(DE-588)4077624-4
(DE-588)4181997-4
(DE-588)4037348-4
(DE-588)4274324-2
title Social engineering the art of human hacking
title_auth Social engineering the art of human hacking
title_exact_search Social engineering the art of human hacking
title_full Social engineering the art of human hacking Christopher Hadnagy
title_fullStr Social engineering the art of human hacking Christopher Hadnagy
title_full_unstemmed Social engineering the art of human hacking Christopher Hadnagy
title_short Social engineering
title_sort social engineering the art of human hacking
title_sub the art of human hacking
topic Social Engineering Sicherheit (DE-588)7539699-3 gnd
Datenschutz (DE-588)4011134-9 gnd
Soziologie (DE-588)4077624-4 gnd
Sozialtechnologie (DE-588)4181997-4 gnd
Manipulation (DE-588)4037348-4 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Social Engineering Sicherheit
Datenschutz
Soziologie
Sozialtechnologie
Manipulation
Computersicherheit
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020812588&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT hadnagychristopher socialengineeringtheartofhumanhacking