Social engineering penetration testing : (Record no. 538309)

MARC details
000 -LEADER
fixed length control field 11625cam a2200469Ia 4500
001 - CONTROL NUMBER
control field ocn878263510
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180529115611.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140426s2014 ne ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124201828
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0124201822
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)878263510
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency AU
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Alfaisal Main Library
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HM668
Item number .W38 2014eb
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Watson, Gavin,
Dates associated with a name 1982-
245 10 - TITLE STATEMENT
Title Social engineering penetration testing :
Remainder of title executing social engineering pen tests, assessments and defense /
Statement of responsibility, etc Gavin Watson, Andrew Mason, Richard Ackroyd.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Burlington :
Name of publisher, distributor, etc Elsevier Science,
Date of publication, distribution, etc 2014.
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Date of production, publication, distribution, manufacture 2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content Type Term text
Content Type Code txt
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term computer
Media Type Code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term online resource
Carrier Type Code cr
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that.
588 0# -
-- Print version record.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Front Cover -- Social Engineering Penetration Testing -- Copyright Page -- Contents -- Foreword -- Acknowledgements -- About the Authors -- About the Technical Editor -- 1 An Introduction to Social Engineering -- Introduction -- Defining social engineering -- Examples from the movies -- Sneakers -- Hackers -- Matchstick Men -- Dirty Rotten Scoundrels -- The Imposter -- Famous social engineers -- Kevin Mitnik -- Frank Abagnale -- Badir brothers -- Chris Hadnagy -- Chris Nickerson -- Real-world attacks -- The RSA breach -- The Buckingham Palace breach -- The Financial Times breach -- The Microsoft XBox breach -- Operation Camion -- Summary -- 2 The Weak Link in the Business Security Chain -- Introduction -- Why personnel are the weakest link -- Secure data with vulnerable users -- The problem with privileges -- Data classifications and need to know -- Security, availability, and functionality -- Customer service mentality -- Poor management example -- Lack of awareness and training -- Weak security policies -- Weak procedures -- Summary -- 3 The Techniques of Manipulation -- Introduction -- Pretexting -- Impersonation -- Baiting -- Pressure and solution -- Leveraging authority -- Reverse social engineering -- Chain of authentication -- Gaining credibility -- From innocuous to sensitive -- Priming and loading -- Social proof -- Framing information -- Emotional states -- Selective attention -- Personality types and models -- Body language -- Summary -- 4 Short and Long Game Attack Strategies -- Introduction -- Short-term attack strategies -- Targeting the right areas -- Using the allotted time effectively -- Common short game scenarios -- Long-term attack strategies -- Expanding on initial reconnaissance -- Fake social media profiles -- Information elicitation -- Extended phishing attacks -- Gaining inside help -- Working at the target company.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Targeting partner companies -- Long-term surveillance -- Summary -- 5 The Social Engineering Engagement -- Introduction -- The business need for social engineering -- Compliance and security standards -- Payment Cards Industry Data Security Standard -- ISO/IEC 27000 information security series -- Human Resource Security, Domain 8 -- Physical and Environmental Security, Domain 9 -- Social engineering operational considerations and challenges -- Challenges for the social engineers -- Less mission impossible, more mission improbable -- Dealing with unrealistic time scales -- Dealing with unrealistic time frames -- Taking one for the team -- Name and shame -- Project management -- Challenges for the client -- Getting the right people -- Legislative considerations -- The Computer Misuse Act 1990 (UK)-http://www.legislation.gov.uk/ukpga/1990/18 -- Section 1-Unauthorized access to computer material -- Section 2-Unauthorized access with intent to commit or facilitate commission of further offenses -- Section 3-Unauthorized acts with intent to impair or with recklessness as to impairing, operation of computer, etc. -- The Police and Justice Act 2006 (UK)-http://www.legislation.gov.uk/ukpga/2006/48/contents -- Making, supplying, or obtaining articles for use in computer misuse offenses -- Regulation of Investigatory Powers Act 2000 (UK)-http://www.legislation.gov.uk/ukpga/2000/23/introduction -- The Human Rights Act 1998 (UK)-http://www.legislation.gov.uk/ukpga/1998/42/contents -- Right to respect for private and family life -- Computer Fraud and Abuse Act-United States -- Social engineering frameworks -- Pre-engagement interactions -- Intelligence gathering -- Threat modeling -- Exploitation -- Post exploitation -- Primary objective (exploitation) -- Secondary objectives (post exploitation) -- Reporting -- Assessment prerequisites -- Scoping documents.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Contact details -- Type of testing -- Scope limitations -- Get out of jail free -- Key deliverables -- The debrief -- Debrief key points -- The report -- Written report key points -- Social engineering team members and skill sets -- The generalist -- Key attribute(s) -- The ethical hacker -- Key attribute(s) -- The burner -- The social engineer -- Key attribute(s) -- The scout -- Key attribute(s) -- The thief -- Key attribute(s) -- Summary -- 6 Ensuring Value Through Effective Threat Modeling -- Introduction -- Why the need for threat modeling? -- Gain access to my underground bunker data center -- Consultant led threat modeling -- What? -- Why? -- Who? -- Where? -- How? -- What? -- Why? -- Who? -- Where? -- How? -- Plugging into the Information Assurance and Risk Management processes -- Gather information using open-source discovery of organizational information -- Perform reconnaissance and surveillance of targeted organizations -- Craft phishing attacks -- Craft spear phishing attacks -- Create counterfeit/spoof web site -- Deliver malware by providing removable media -- Exploit physical access of authorized staff to gain access to organizational facilities -- Conduct outsider-based social engineering to obtain information -- Conduct insider-based social engineering to obtain information -- Obtain information by opportunistically stealing or scavenging information systems/components -- Who would want to gain access to my business? -- State-sponsored/terrorist groups -- Organized crime groups -- Trouble causers, hobbyists, and lone gunmen -- Other players -- Summary -- 7 Creating Targeted Scenarios -- Introduction -- The components of a scenario -- Target identification -- Open-source reconnaissance -- Target profiling -- Physical reconnaissance -- Target engagement -- Pretext design mapping -- Planning for the unknown -- Scenario specific outcomes.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Cover stories -- Exit strategies -- Designing to fail -- Summary -- 8 Leveraging Open-Source Intelligence -- Introduction -- The corporate website -- Business purpose -- Partners, clients, vendors -- E-mail addresses -- Employee names -- Staff hierarchy -- Phone numbers -- Photos of employees and business locations -- Spidering -- Passive Spider -- Active spidering with OWASP Zed Attack Proxy -- Why is this information useful to a social engineer? -- Document metadata -- Strings -- FOCA-http://www.informatica64.com/foca.aspx -- Metagoofil -- Why document metadata is useful to social engineers -- Photographic metadata -- Exiftool-http://www.sno.phy.queensu.ca/~phil/exiftool/ -- Image Picker-a Firefox add-on-https://addons.mozilla.org/en-us/firefox/addon/image-picker/ -- Using Wget to download images from a site -- GeoSetter-http://www.geosetter.de/en/ -- Reverse image search engines -- Not so metadata -- PDFGrep-http://pdfgrep.sourceforge.net -- Document obfuscation -- The Way Back Machine-http://archive.org/web/web.php -- E-mail addresses -- Phishing attacks -- Password attacks -- Insider knowledge -- E-mail address conventions -- theharvester-https://code.google.com/p/theharvester/ -- FOCA -- Metagoofil -- Whois -- Sam Spade -- Jigsaw -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng-also includes a handful of Jigsaw modules -- Social media -- LinkedIn -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng -- Facebook -- Twitter -- Recon-ng -- DNS records -- Dnsrecon-https://github.com/darkoperator/dnsrecon-Twitter-@Carlos_Perez -- Subdomain brute forcing -- CeWL-http://www.digininja.org/projects/cewl.php -- Whois records -- Making use of the intel -- Summary -- 9 The E-mail Attack Vector -- Introduction -- An introduction to phishing attacks -- Why phishing attacks work -- The client-side attack -- Spear phishing versus trawling -- Trawling.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Spear phishing -- Real-world phishing examples -- American Express-drive-by-download -- Dr. Atanasoff Gavin-advance fee fraud -- Apple ID scam-credential harvesting -- Nobody falls for this one. Nobody. Ever. -- Active e-mail reconnaissance -- Nondelivery reports -- Out-of-office responses -- The nonexistent meeting -- Impersonating the absent staff member -- Creating plausible e-mail scenarios -- Work experience placements -- Weaponizing the scenario -- The college project -- Weaponizing the scenario -- The recruitment consultant -- Salesperson -- Defending against phishing attacks -- Technological approaches -- Spam and antivirus products at the gateway, mail server, and the endpoint or client machine -- Host based intrusion preventions or "HIPS" products, and network based intrusion prevention systems -- Client application patching -- Outbound content filtering-firewalls and proxies -- Human approaches -- Setting up your own attack -- Spoofed e-mails versus fake domain names -- The SET -- Spear phishing attack vector -- Does this approach really work? -- Malicious Java applets -- Using cloned web sites to harvest credentials -- Is all of this really social engineering? -- Summary -- 10 The Telephone Attack Vector -- Introduction -- Real-world examples -- Kevin Mitnick -- Card cancelation scams -- Environmental sounds -- The issues with caller ID -- Caller ID spoofing -- Phone system hacks -- Is the contact database up to date? -- Transferring caller ID -- How to figure out if your caller ID shows up -- Summing it up -- Building on the e-mail attack -- Please contact Sarah in my absence -- Who ya gonna call? -- Job enquiries -- Sales calls -- Surveys -- Impersonating staff members -- The help desk -- Employee numbers -- Obtaining key information and access -- Credentials and e-mail access -- Physical access -- The physical access zero day.
590 ## - LOCAL NOTE (RLIN)
Local note Elsevier
Provenance (VM) [OBSOLETE] ScienceDirect All Books
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social engineering.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element SOCIAL SCIENCE
General subdivision General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Social engineering.
Source of heading or term fast
-- (OCoLC)fst01122444
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mason, Andrew.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ackroyd, Richard.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ScienceDirect eBooks.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Watson, Gavin.
Title Social engineering penetration testing.
Place, publisher, and date of publication Burlington : Elsevier Science, 2014
International Standard Book Number 9780124201828
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://ezproxy.alfaisal.edu/login?url=https://www.sciencedirect.com/science/book/9780124201248">http://ezproxy.alfaisal.edu/login?url=https://www.sciencedirect.com/science/book/9780124201248</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBooks

No items available.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu