Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Introduction
Am I a Builder Yet? Teaching People to Phish What You Can Expect Conventions Used in This Book Summary Notes
Chapter 1: An Introduction to the Wild World of Phishing
Phishing 101 How People Phish Examples Summary Notes
Chapter 2: The Psychological Principles of Decision-Making
Decision-Making: Small Bits It Seemed Like a Good Idea at the Time How Phishers Bait the Hook Introducing the Amygdala Wash, Rinse, Repeat Summary Notes
Chapter 3: Influence and Manipulation
Why the Difference Matters to Us How Do I Tell the Difference? But the Bad Guys Will Use Manipulation … Lies, All Lies P Is for Punishment Principles of Influence More Fun with Influence Things to Know About Manipulation Summary Notes
Chapter 4: Lessons in Protection
Lesson One: Critical Thinking Lesson Two: Learn to Hover Lesson Three: URL Deciphering Lesson Four: Analyzing E-mail Headers Lesson Five: Sandboxing The “Wall of Sheep,” or a Net of Bad Ideas Summary
Chapter 5: Plan Your Phishing Trip: Creating the Enterprise Phishing Program
The Basic Recipe Developing the Program Summary
Chapter 6: The Good, the Bad, and the Ugly: Policies and More
Oh, the Feels: Emotion and Policies The Boss Is Exempt I'll Just Patch One of the Holes Phish Just Enough to Hate It If You Spot a Phish, Call This Number The Bad Guys Take Mondays Off If You Can't See It, You Are Safe The Lesson for Us All Summary
Chapter 7: The Professional Phisher's Tackle Bag
Commercial Applications Open Source Applications Comparison Chart Managed or Not Summary
Chapter 8: Phish Like a Boss
Phishing the Deep End Summary Notes
End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion