Table of Contents

Cover image

Title page

Copyright

Foreword

Acknowledgements

About the Authors

About the Technical Editor

Chapter 1. An Introduction to Social Engineering

Introduction

Defining social engineering

Examples from the movies

Famous social engineers

Real-world attacks

Summary

Chapter 2. The Weak Link in the Business Security Chain

Introduction

Why personnel are the weakest link

Summary

Chapter 3. The Techniques of Manipulation

Introduction

Pretexting

Impersonation

Baiting

Pressure and solution

Leveraging authority

Reverse social engineering

Chain of authentication

Gaining credibility

From innocuous to sensitive

Priming and loading

Social proof

Framing information

Emotional states

Selective attention

Personality types and models

Body language

Summary

Chapter 4. Short and Long Game Attack Strategies

Introduction

Short-term attack strategies

Long-term attack strategies

Summary

Chapter 5. The Social Engineering Engagement

Introduction

The business need for social engineering

Social engineering operational considerations and challenges

Challenges for the social engineers

Challenges for the client

Legislative considerations

Social engineering frameworks

Assessment prerequisites

Key deliverables

Social engineering team members and skill sets

Summary

Chapter 6. Ensuring Value Through Effective Threat Modeling

Introduction

Why the need for threat modeling?

Who would want to gain access to my business?

Summary

Chapter 7. Creating Targeted Scenarios

Introduction

The components of a scenario

Target identification

Pretext design mapping

Planning for the unknown

Designing to fail

Summary

Chapter 8. Leveraging Open-Source Intelligence

Introduction

The corporate website

E-mail addresses

Social media

DNS records

Summary

Chapter 9. The E-mail Attack Vector

Introduction

An introduction to phishing attacks

Why phishing attacks work

Spear phishing versus trawling

Spear phishing

Real-world phishing examples

American Express—drive-by-download

Dr. Atanasoff Gavin—advance fee fraud

Apple ID scam—credential harvesting

Nobody falls for this one. Nobody. Ever.

Active e-mail reconnaissance

Nondelivery reports

Out-of-office responses

The nonexistent meeting

Impersonating the absent staff member

Creating plausible e-mail scenarios

Work experience placements

Weaponizing the scenario

The college project

Weaponizing the scenario

The recruitment consultant

Salesperson

Defending against phishing attacks

Technological approaches

Human approaches

Setting up your own attack

Spoofed e-mails versus fake domain names

The SET

Spear phishing attack vector

Does this approach really work?

Malicious Java applets

Using cloned web sites to harvest credentials

Is all of this really social engineering?

Summary

Chapter 10. The Telephone Attack Vector

Introduction

Real-world examples

Environmental sounds

The issues with caller ID

Caller ID spoofing

Phone system hacks

Is the contact database up to date?

Transferring caller ID

How to figure out if your caller ID shows up

Summing it up

Building on the e-mail attack

Please contact Sarah in my absence

Who ya gonna call?

Job enquiries

Sales calls

Surveys

Impersonating staff members

The help desk

Employee numbers

Obtaining key information and access

Credentials and e-mail access

Physical access

The physical access zero day

Weaponizing your call

Summary

Chapter 11. The Physical Attack Vector

Introduction

Building on the e-mail and telephone attacks

Active information gathering

Props and disguises

Badges and lanyards

Tailgating

Lock picking

Once you’re inside

Summary

Chapter 12. Supporting an Attack with Technology

Introduction

Summary

Chapter 13. Writing the Report

Introduction

Data collection

Writing the report

Delivery of the report

Summary

Chapter 14. Creating Hardened Policies and Procedures

Introduction

Background

Social engineering defense: a proactive approach

Industry information security and cyber security standards

Developing fit for purpose social engineering policies and procedures

Summary

Chapter 15. Staff Awareness and Training Programs

Introduction

Current awareness training

A model for effective training

Summary

Chapter 16. Internal Social Engineering Assessments

Introduction

The need for internal testing

Designing the internal test

Summary

Chapter 17. Social Engineering Assessment Cheat Sheet

Introduction

Social engineering framework

Social engineering cheat sheet

Summary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset