Foreword |
|
xxiii | |
Introduction |
|
xxvii | |
|
Chapter 1 An Introduction to the Wild World of Phishing |
|
|
1 | (32) |
|
|
2 | (2) |
|
|
4 | (3) |
|
|
7 | (22) |
|
|
7 | (3) |
|
Phish in Their Natural Habitat |
|
|
10 | (12) |
|
|
22 | (5) |
|
|
27 | (2) |
|
|
29 | (4) |
|
Chapter 2 The Psychological Principles of Decision-Making |
|
|
33 | (20) |
|
Decision-Making: Small Bits |
|
|
34 | (6) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
38 | (1) |
|
The Bottom Line About Decision-Making |
|
|
39 | (1) |
|
It Seemed Like a Good Idea at the Time |
|
|
40 | (1) |
|
How Phishers Bait the Hook |
|
|
41 | (3) |
|
|
44 | (5) |
|
The Guild of Hijacked Amygdalas |
|
|
45 | (3) |
|
Putting a Leash on the Amygdala |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (3) |
|
Chapter 3 Influence and Manipulation |
|
|
53 | (22) |
|
Why the Difference Matters to Us |
|
|
55 | (1) |
|
How Do I Tell the Difference? |
|
|
56 | (1) |
|
How Will We Build Rapport with Our Targets? |
|
|
56 | (1) |
|
How Will Our Targets Feel After They Discover They've Been Tested? |
|
|
56 | (1) |
|
|
57 | (1) |
|
But the Bad Guys Will Use Manipulation ... |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (6) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Consistency and Commitment |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Things to Know About Manipulation |
|
|
70 | (1) |
|
|
71 | (4) |
|
Chapter 4 Lessons in Protection |
|
|
75 | (22) |
|
Lesson One Critical Thinking |
|
|
76 | (1) |
|
How Can Attackers Bypass This Method? |
|
|
77 | (1) |
|
Lesson Two Learn to Hover |
|
|
77 | (5) |
|
What If I Already Clicked the Link and I Think It's Dangerous? |
|
|
80 | (1) |
|
How Can Attackers Bypass This Method? |
|
|
81 | (1) |
|
Lesson Three URL Deciphering |
|
|
82 | (3) |
|
How Can Attackers Bypass This Method? |
|
|
85 | (1) |
|
Lesson Four Analyzing E-mail Headers |
|
|
85 | (5) |
|
How Can Attackers Bypass This Method? |
|
|
90 | (1) |
|
|
90 | (2) |
|
How Can Attackers Bypass This Method? |
|
|
91 | (1) |
|
The "Wall of Sheep," or a Net of Bad Ideas |
|
|
92 | (3) |
|
Copy and Paste Your Troubles Away |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
A Good Antivirus Program Will Save You |
|
|
94 | (1) |
|
|
95 | (2) |
|
Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program |
|
|
97 | (34) |
|
|
99 | (8) |
|
|
99 | (3) |
|
|
102 | (3) |
|
The Big, Fat, Not-So-Legal Section |
|
|
105 | (2) |
|
|
107 | (21) |
|
|
108 | (1) |
|
Setting the Difficulty Level |
|
|
109 | (12) |
|
|
121 | (1) |
|
|
122 | (3) |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
128 | (3) |
|
Chapter 6 The Good, the Bad, and the Ugly: Policies and More |
|
|
131 | (16) |
|
Oh, the Feels: Emotion and Policies |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
I'll Just Patch One of the Holes |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Phish Just Enough to Hate It |
|
|
136 | (2) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
If You Spot a Phish, Call This Number |
|
|
138 | (2) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
The Bad Guys Take Mondays Off |
|
|
140 | (2) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
If You Can't See It, You Are Safe |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (3) |
|
Chapter 7 The Professional Phisher's Tackle Bag |
|
|
147 | (32) |
|
|
149 | (19) |
|
|
149 | (3) |
|
|
152 | (6) |
|
|
158 | (3) |
|
|
161 | (4) |
|
|
165 | (3) |
|
|
168 | (6) |
|
SET: Social-Engineer Toolkit |
|
|
168 | (3) |
|
|
171 | (3) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (2) |
|
Chapter 8 Phish Like a Boss |
|
|
179 | (10) |
|
|
180 | (7) |
|
Understand What You're Dealing With |
|
|
180 | (2) |
|
Set Realistic Goals for Your Organization |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (2) |
|
Make the Choice: Build Inside or Outside |
|
|
186 | (1) |
|
|
187 | (2) |
Index |
|
189 | |