Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Introduction
Am I a Builder Yet?
Teaching People to Phish
What You Can Expect
Conventions Used in This Book
Summary
Notes
Chapter 1: An Introduction to the Wild World of Phishing
Phishing 101
How People Phish
Examples
Summary
Notes
Chapter 2: The Psychological Principles of Decision-Making
Decision-Making: Small Bits
It Seemed Like a Good Idea at the Time
How Phishers Bait the Hook
Introducing the Amygdala
Wash, Rinse, Repeat
Summary
Notes
Chapter 3: Influence and Manipulation
Why the Difference Matters to Us
How Do I Tell the Difference?
But the Bad Guys Will Use Manipulation …
Lies, All Lies
P Is for Punishment
Principles of Influence
More Fun with Influence
Things to Know About Manipulation
Summary
Notes
Chapter 4: Lessons in Protection
Lesson One: Critical Thinking
Lesson Two: Learn to Hover
Lesson Three: URL Deciphering
Lesson Four: Analyzing E-mail Headers
Lesson Five: Sandboxing
The “Wall of Sheep,” or a Net of Bad Ideas
Summary
Chapter 5: Plan Your Phishing Trip: Creating the Enterprise Phishing Program
The Basic Recipe
Developing the Program
Summary
Chapter 6: The Good, the Bad, and the Ugly: Policies and More
Oh, the Feels: Emotion and Policies
The Boss Is Exempt
I'll Just Patch One of the Holes
Phish Just Enough to Hate It
If You Spot a Phish, Call This Number
The Bad Guys Take Mondays Off
If You Can't See It, You Are Safe
The Lesson for Us All
Summary
Chapter 7: The Professional Phisher's Tackle Bag
Commercial Applications
Open Source Applications
Comparison Chart
Managed or Not
Summary
Chapter 8: Phish Like a Boss
Phishing the Deep End
Summary
Notes
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →