HACKING: Social Engineering Attacks, Techniques & Prevention, Alex Wagner
  • $5.24
    • Facebook Share
    • Twitter Share
    • Pinterest Share

Details

HACKING: Social Engineering Attacks, Techniques & Prevention

Author: Alex Wagner

Narrator: Jack Bellows

Unabridged: 3 hr 30 min

Format: Digital Audiobook

Publisher: Findaway Voices

Published: 02/13/2020

Genre: Computers - Operating Systems - Linux

Synopsis

This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers.

If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY.

The focus of this book will be to introduce some of the most well known social engineering techniques.

This book contains step by step deployment guides of performances on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.

IN THIS BOOK YOU WILL LEARN ABOUT:

-Phishing, Vishing, Smishing, Spear Phishing and Whaling

-The history of social engineering

-Psychological manipulation

-Human Weaknesses

-Social Engineering Categories

-Cold Call Virus Scams

-Authority & Fear Establishment

-Executing the Social Engineering Attack

-Signifying Legitimacy by Providing Value

-Open-Source Intelligence

-Organizational Reconnaissance

-Identifying Targets Within an Organization

-In-person social engineering techniques

-Dumpster Diving & Data Breaches

-Phishing Page Types

-Filter Evasion Techniques

-How to use PhishTank and Phish5

-Identity Theft and Impersonation

-Social Engineering Countermeasures

-Paper & Digital Record Destruction

-Physical Security Measures

-Principle of Least Privilege

-2FA & Side Channel ID Verification

-Logging & Monitoring

-How to respond to an Attack

-Tips to Avoid Being a Victim

BUY THIS BOOK NOW AND GET STARTED TODAY!

Recommended

The Linux Command Line Beginner's Guide
The Linux Command Line Beginner's Guide
by Jonathan Moeller

The Linux Command Line Beginner's Guide gives users new to Linux an introduction to the command line environment.In the Guide, you'll learn how to:-Copy, move, and delete files and directories.-Create, delete, and manage users.-Create, delete, and m...

Narrator: Madison Niederhauser
Published: 02/19/2020

HACKING Denial of Service Attacks
HACKING
by Alex Wagner

In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured. This book will focus on some of the most dange...

Narrator: Jack Bellows
Published: 01/15/2020

HACKING How to Hack Web Apps
HACKING
by Alex Wagner

Considering that you are preparing to became an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about Vulnerabilities in both Web Applications and Web Services, how to hac...

Narrator: Sam Thurman
Published: 02/14/2020

Once Gone
Once Gone
by Blake Pierce

Women are turning up dead in the rural outskirts of Virginia, killed in grotesque ways, and when the FBI is called in, they are stumped. A serial killer is out there, his frequency increasing, and they know there is only one agent good enough to cra...

Narrator: Elaine Wise
Published: 06/08/2016

Linux for Beginners 37 Linux Commands you Must Know
Linux for Beginners
by ATTILA KOVACS

If you are looking to get started with the Linux command line interface you've definitely come to the right place!Familiarizing yourself to the environment that powers the backbone of the production server universe is a great move. This book will co...

Narrator: Ryan Simpson
Published: 02/13/2020

Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
by Gllen D. Singh

Kali Linux is the most well known and high level infiltration testing Linux conveyance inside the online protection industry. Utilizing Kali Linux, a network protection expert will actually want to find and take advantage of different weaknesses and...

Narrator: Alex Freeman
Published: 01/16/2023

Girl, Alone 01
Girl, Alone
by Blake Pierce

“A MASTERPIECE OF THRILLER AND MYSTERY. Blake Pierce did a magnificent job developing characters with a psychological side so well described that we feel inside their minds, follow their fears and cheer for their success. Full of twists, this ...

Narrator: Abigail Reno
Published: 12/28/2020

Linux for Beginners How to Perform Linux Admin Tasks
Linux for Beginners
by ATTILA KOVACS

If you're looking to become more effective at working with the infrastructure that powers DevOps, web applications, Enterprise servers, or you just want to tighten your control over a few Linux machines, then this book is for you!This book will intr...

Narrator: Ryan Simpson
Published: 02/13/2020

HACKING Hacking Firewalls & Bypassing Honeypots
HACKING
by Alex Wagner

If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to...

Narrator: Jack Bellows
Published: 02/14/2020
{"id":"5837147","ean":"9781094267272","abr":"Unabridged","title":"HACKING: Social Engineering Attacks, Techniques & Prevention","subtitle":"Social Engineering Attacks, Techniques & Prevention","author":"Alex Wagner","rating_average":"0","narrator":"Jack Bellows","ubr_id":"5837147","abr_id":"0","ubr_price":"8.50","abr_price":"0.00","ubr_memprice":"5.10","abr_memprice":"0.00","ubr_narrator":"Jack Bellows","abr_narrator":"","ubr_length":"Unabridged: 3 hr 30 min","abr_length":"Abridged: "}