Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Contents
ACKNOWLEDGEMENTS
PREFACE
TARGET AUDIENCE
WHAT THIS BOOK COVERS
ABOUT THE AUTHOR
LIMITATION OF LIABILITY / DISCLAIMER OF WARRANTY
INTRODUCTION TO SOCIAL ENGINEERING
OVERVIEW
HISTORY
TYPES OF SOCIAL ENGINEERING
Email (Phishing/Spear phishing)
Telephone (Vishing)
Baiting
Fax
Pretexting
INFLUENCING TECHNIQUES
RECIPROCITY
AUTHORITY
SCARCITY
LlKABILITY
CONCESSION
OBLIGATION
ELICITATION
FLATTERY
FALSE STATEMENTS
ARTIFICIAL IGNORANCE
THE SOUNDING BOARD
BRACKETING
CONFIDENTIAL BAITING
PRETEXTING
RESEARCH & PLANNING
LEGAL CONSIDERATIONS
BODY LANGUAGE
Positioning
Emulating
Anchoring
INFORMATION GATHERING
OVERVIEW
INFORMATION ORGANIZATION
Overview
Dradis Framework
KeepNote
SOURCES OF INFORMATION
Online
Surveillance
TOOLS
COMPUTER BASED TOOLS
Kali Linux
Social Engineering Toolkit (SET)
Metasploit Framework
Maltego
PHYSICAL TOOLS
Cameras
GPS
Clothing
Telephone
Lock Picking
Miscellaneous Tools
THE PLAYBOOK
LEGAL & WARRANTY DlSCLAIMER
SPEAR PHISHING
Security Bulletin!
Bank Security Email Alert
IRS Audit Notice
Get Your Updates Here
Company Re-Org
TELEPHONE
The Forgetful User
Sleight of Hand
Financial Foray
Attack of the Phones
Car Tow
BAITING
Oldie but A Goody
Blazing Fast Interwebs
Save Big Money!
Recalling All Cars!
Bank Security Software
RESOURCES
← Prev
Back
Next →
← Prev
Back
Next →