Foreword |
|
xv | |
Acknowledgments and Preface |
|
xvii | |
Introduction |
|
xxi | |
|
I Building the Foundation |
|
|
1 | (50) |
|
1 What Is Nonverbal Communication? |
|
|
3 | (22) |
|
The Different Aspects of Nonverbal Communication |
|
|
8 | (1) |
|
|
9 | (4) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (1) |
|
How to Use This Information |
|
|
20 | (3) |
|
|
23 | (2) |
|
2 What Is Social Engineering? |
|
|
25 | (26) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
The Three Basic Forms of Social Engineering |
|
|
34 | (1) |
|
|
35 | (4) |
|
When The Phone Is More Dangerous Than Malware |
|
|
39 | (4) |
|
I Am Not the Social Engineer You Are Looking For |
|
|
43 | (2) |
|
Using Social Engineering Skills |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (3) |
|
II Decoding the Language of the Body |
|
|
51 | (108) |
|
3 Understanding the Language of the Hands |
|
|
53 | (28) |
|
Communicating with Your Hands |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (8) |
|
High-Confidence Hand Displays |
|
|
66 | (9) |
|
Low-Confidence and Stress Hand Displays |
|
|
75 | (3) |
|
Getting a Handle on the Hands |
|
|
78 | (1) |
|
|
79 | (2) |
|
4 The Torso, Legs, and Feet |
|
|
81 | (18) |
|
|
83 | (6) |
|
|
89 | (8) |
|
|
97 | (2) |
|
5 The Science Behind the Face |
|
|
99 | (40) |
|
|
103 | (2) |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
109 | (4) |
|
|
113 | (3) |
|
|
116 | (5) |
|
|
121 | (4) |
|
|
125 | (3) |
|
|
128 | (4) |
|
|
132 | (4) |
|
Perfect Practice Makes Perfect |
|
|
136 | (1) |
|
|
137 | (2) |
|
6 Understanding Nonverbal Displays of Comfort and Discomfort |
|
|
139 | (20) |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (4) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Self-Comforting and Head Tilts |
|
|
154 | (3) |
|
|
157 | (1) |
|
|
158 | (1) |
|
III Deciphering the Science |
|
|
159 | (38) |
|
7 The Human Emotional Processor |
|
|
161 | (16) |
|
|
164 | (1) |
|
How the Amygdala Processes Information |
|
|
165 | (2) |
|
|
167 | (2) |
|
|
169 | (1) |
|
Reading Other People's Expressions |
|
|
170 | (1) |
|
Your Own Emotional Content |
|
|
171 | (1) |
|
|
171 | (1) |
|
Using Amygdala Hijacking as a Social Engineer |
|
|
172 | (2) |
|
|
174 | (3) |
|
8 The Nonverbal Side of Elicitation |
|
|
177 | (20) |
|
Artificial Time Constraints |
|
|
181 | (1) |
|
Sympathy/Assistance Themes |
|
|
182 | (2) |
|
|
184 | (2) |
|
Ask How, When, and Why Questions |
|
|
186 | (1) |
|
|
187 | (1) |
|
Action Unit 1: Inner Brow Raiser |
|
|
188 | (1) |
|
Action Unit 2: Outer Brow Raiser |
|
|
188 | (1) |
|
Action Unit 4: Brow Lowerer |
|
|
189 | (1) |
|
Conversational Signals of Emotions |
|
|
190 | (1) |
|
Breaking Down Conversational Signals |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Nonverbal Conversational Signals |
|
|
193 | (2) |
|
Conversational Signals as a Social Engineer |
|
|
195 | (1) |
|
|
196 | (1) |
|
IV Putting It All Together |
|
|
197 | (166) |
|
9 Nonverbal Communication and the Human Being |
|
|
199 | |
|
Applying This Information as a Professional Social Engineer |
|
|
202 | (4) |
|
Using This Book to Defend |
|
|
206 | (1) |
|
Becoming a Critical Thinker |
|
|
207 | (3) |
|
|
210 | (3) |
Index |
|
213 | |
Foreword |
|
xiii | |
Preface and Acknowledgments |
|
xvii | |
|
1 A Look into the World of Social Engineering |
|
|
1 | (22) |
|
Why This Book Is So Valuable |
|
|
3 | (6) |
|
Overview of Social Engineering |
|
|
9 | (12) |
|
|
21 | (2) |
|
|
23 | (32) |
|
|
26 | (7) |
|
Sources for Information Gathering |
|
|
33 | (10) |
|
|
43 | (10) |
|
The Power of Communication Models |
|
|
53 | (2) |
|
|
55 | (22) |
|
|
56 | (2) |
|
|
58 | (16) |
|
|
74 | (2) |
|
|
76 | (1) |
|
4 Pretexting: How to Become Anyone |
|
|
77 | (24) |
|
|
78 | (1) |
|
The Principles and Planning Stages of Pretexting |
|
|
79 | (12) |
|
|
91 | (8) |
|
|
99 | (2) |
|
5 Mind Tricks: Psychological Principles Used in Social Engineering |
|
|
101 | (80) |
|
|
103 | (6) |
|
|
109 | (27) |
|
Neurolinguistic Programming (NLP) |
|
|
136 | (7) |
|
Interview and Interrogation |
|
|
143 | (19) |
|
|
162 | (10) |
|
The Human Buffer Overflow |
|
|
172 | (6) |
|
|
178 | (3) |
|
6 Influence: The Power of Persuasion |
|
|
181 | (78) |
|
The Five Fundamentals of Influence and Persuasion |
|
|
182 | (5) |
|
|
187 | (28) |
|
Altering Reality: Framing |
|
|
215 | (18) |
|
Manipulation: Controlling Your Target |
|
|
233 | (15) |
|
Manipulation in Social Engineering |
|
|
248 | (8) |
|
|
256 | (3) |
|
7 The Tools of the Social Engineer |
|
|
259 | (40) |
|
|
260 | (19) |
|
Online Information-Gathering Tools |
|
|
279 | (18) |
|
|
297 | (2) |
|
8 Case Studies: Dissecting the Social Engineer |
|
|
299 | (40) |
|
Mitnick Case Study 1: Hacking the DMV |
|
|
300 | (6) |
|
Mitnick Case Study 2: Hacking the Social Security Administration |
|
|
306 | (4) |
|
Hadnagy Case Study 1: The Overconfident CEO |
|
|
310 | (7) |
|
Hadnagy Case Study 2: The Theme Park Scandal |
|
|
317 | (5) |
|
Top-Secret Case Study 1: Mission Not Impossible |
|
|
322 | (7) |
|
Top-Secret Case Study 2: Social Engineering a Hacker |
|
|
329 | (8) |
|
Why Case Studies Are Important |
|
|
337 | (1) |
|
|
338 | (1) |
|
9 Prevention and Mitigation |
|
|
339 | (24) |
|
Learning to Identify Social Engineering Attacks |
|
|
340 | (1) |
|
Creating a Personal Security Awareness Culture |
|
|
341 | (3) |
|
Being Aware of the Value of the Information You Are Being Asked For |
|
|
344 | (3) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Learning from Social Engineering Audits |
|
|
348 | (6) |
|
|
354 | (7) |
|
|
361 | (2) |
Index |
|
363 | |