O'Reilly logo

Cyber Reconnaissance, Surveillance and Defense by Robert Shimonski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Social Engineering

Abstract

In this chapter, we learn how to get more information directly (or indirectly) from other sources through human interaction. This chapter will essentially round out the remaining information needed to conduct an investigation on a user, group, or entity.

Keywords

Backtrack
Social Engineering
Investigations
Shoulder Surfing
Dumpster Diving
Eavesdropping
Phishing
Bugging
Tracking
Spear-Phishing
Infectious Media Generator
Mass Mailer Attack
SMS Spoofing
Wireless Access Point Attack Vector
Reverse Social Engineering
Advanced Persistence Threat (APT)

Social engineering

Security is built on the foundation of trust. You can secure your identity, computer, or access to your home, but you do give this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required