Social engineering penetration testing: executing social engineering pen tests, assessments and defense

This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...

Full description

Saved in:
Bibliographic Details
Main Authors: Watson, Gavin 1982- (Author), Mason, Andrew G. (Author), Ackroyd, Richard (Author)
Format: Electronic eBook
Language:English
Published: Waltham, Massachusetts Syngress 2014
Subjects:
Links:https://learning.oreilly.com/library/view/-/9780124201248/?ar
Summary:This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, the reader will have a much better understanding of how best to defend against these attacks. The authors show hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. The book shows how to use widely available open-source tools to conduct pen tests and the practical steps to improve defense measures in response to test results. --
Item Description:Includes bibliographical references and index. - Print version record
Physical Description:1 Online-Ressource Illustrationen
ISBN:9780124201828
0124201822
1306642329
9781306642323
0124201245
9780124201248