Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
Who This Book Is For |
|
xx | |
What You'll Find in This Book |
|
xx | |
Summary |
|
xxi | |
|
|
1 | (22) |
|
1 What Is Social Engineering? |
|
|
3 | (10) |
|
Important Concepts in Social Engineering |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Psychological Concepts in Social Engineering |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Dr. Cialdini's Six Principles of Persuasion |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
12 | (1) |
|
2 Ethical Considerations In Social Engineering |
|
|
13 | (10) |
|
Ethical Social Engineering |
|
|
14 | (1) |
|
|
14 | (1) |
|
Understanding Legal Considerations |
|
|
14 | (1) |
|
Understanding Service Considerations |
|
|
15 | (1) |
|
Debriefing After the Engagement |
|
|
16 | (1) |
|
Case Study: Social Engineering Taken Too Far |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
Following Laws and Regulations |
|
|
18 | (2) |
|
Case Study: Ethical Limits of Social Engineering |
|
|
20 | (2) |
|
|
22 | (1) |
|
PART II OFFENSIVE SOCIAL ENGINEERING |
|
|
23 | (112) |
|
3 Preparing For An Attack |
|
|
25 | (10) |
|
Coordinating with the Client |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Building Successful Pretexts |
|
|
27 | (1) |
|
Using Specialized Operating Systems for Social Engineering |
|
|
28 | (1) |
|
Following the Attack Phases |
|
|
29 | (4) |
|
Case Study: Why Scoping Matters |
|
|
33 | (1) |
|
|
33 | (2) |
|
4 Gathering business osint |
|
|
35 | (18) |
|
Case Study: Why OSINT Matters |
|
|
36 | (1) |
|
Understanding Types of OSINT |
|
|
36 | (1) |
|
|
37 | (1) |
|
Getting Basic Business Information from Crunchbase |
|
|
37 | (3) |
|
Identifying Website Owners with WHOIS |
|
|
40 | (2) |
|
Collecting OSINT from the Command Line with Recon-ng |
|
|
42 | (6) |
|
Using Other Tools: theHarvester and OSINT Framework |
|
|
48 | (1) |
|
Finding Email Addresses with Hunter |
|
|
49 | (1) |
|
Exploiting Mapping and Geolocation Tools |
|
|
50 | (1) |
|
|
51 | (2) |
|
5 Social Media And Public Documents |
|
|
53 | (18) |
|
Analyzing Social Media for OSINT |
|
|
53 | (1) |
|
|
54 | (2) |
|
Job Boards and Career Sites |
|
|
56 | (1) |
|
|
57 | (3) |
|
|
60 | (3) |
|
Leveraging Shodan for OSINT |
|
|
63 | (1) |
|
Using Shodan Search Parameters |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Searching Hostnames and Subdomains |
|
|
65 | (1) |
|
Taking Automatic Screenshots with Hunchly |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
69 | (2) |
|
6 Gathering Osint About People |
|
|
71 | (12) |
|
Using OSINT Tools for Analyzing Email Addresses |
|
|
72 | (1) |
|
Finding Out If a User Has Been Breached with Have I Been Pwned |
|
|
72 | (1) |
|
Enumerating Social Media Accounts with Sherlock |
|
|
73 | (1) |
|
Enumerating Website Accounts with WhatsMyName |
|
|
73 | (1) |
|
Analyzing Passwords with Pwdlogy |
|
|
74 | (1) |
|
Analyzing a Target's Images |
|
|
75 | (1) |
|
Manually Analyzing EXIF Data |
|
|
76 | (1) |
|
Analyzing Images by Using ExifTool |
|
|
76 | (4) |
|
Analyzing Social Media Without Tools |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Case Study: The Dinner That Gave All the Gold Away |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (24) |
|
Setting Up a Phishing Attack |
|
|
84 | (1) |
|
Setting Up a Secure VPS Instance for Phishing Landing Pages |
|
|
84 | (8) |
|
Choosing an Email Platform |
|
|
92 | (2) |
|
Purchasing Sending and Landing Page Domains |
|
|
94 | (1) |
|
Setting Up the Phishing and Infrastructure Web Server |
|
|
94 | (1) |
|
Additional Steps for Phishing |
|
|
95 | (1) |
|
Using Tracking Pixels to Measure How Often Your Email Is Opened |
|
|
96 | (1) |
|
Automating Phishing with Gophish |
|
|
96 | (5) |
|
Adding HTTPS Support for Phishing Landing Pages |
|
|
101 | (1) |
|
Using URL Shorteners in Phishing |
|
|
101 | (1) |
|
Using SpoofCard for Call Spoofing |
|
|
102 | (1) |
|
Timing and Delivery Considerations |
|
|
102 | (1) |
|
Case Study: The $25 Advanced Persistent Phish |
|
|
102 | (3) |
|
|
105 | (2) |
|
|
107 | (14) |
|
An Example of a Cloned Website |
|
|
108 | (1) |
|
|
108 | (2) |
|
The Sensitive Questions Page |
|
|
110 | (1) |
|
|
111 | (1) |
|
Harvesting the Information |
|
|
112 | (1) |
|
|
113 | (1) |
|
Finding the Login and User Pages |
|
|
114 | (1) |
|
Cloning the Pages by Using HTTrack |
|
|
114 | (2) |
|
Altering the Login Field Code |
|
|
116 | (3) |
|
Adding the Web Pages to the Apache Server |
|
|
119 | (1) |
|
|
119 | (2) |
|
9 Detection, Measurement, And Reporting |
|
|
121 | (14) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Ratios, Medians, Means, and Standard Deviations |
|
|
123 | (1) |
|
The Number of Times an Email Is Opened |
|
|
124 | (1) |
|
|
125 | (1) |
|
Information Input into Forms |
|
|
126 | (1) |
|
Actions Taken by the Victim |
|
|
127 | (1) |
|
|
128 | (1) |
|
The Timeliness of Corrective Actions |
|
|
128 | (1) |
|
The Success of Corrective Actions |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Knowing When to Make a Phone Call1 |
|
|
130 | (1) |
|
|
130 | (3) |
|
|
133 | (2) |
|
PART III DEFENDING AGAINST SOCIAL ENGINEERING |
|
|
135 | (48) |
|
10 Proactive Defense Techniques |
|
|
137 | (12) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Incentives for Good Behavior |
|
|
139 | (1) |
|
Running Phishing Campaigns |
|
|
140 | (1) |
|
Reputation and OSINT Monitoring |
|
|
140 | (1) |
|
Implementing a Monitoring Program |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
The SANS Incident Response Process |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Responding to OSINT Collection |
|
|
145 | (1) |
|
|
145 | (1) |
|
How Users Should Report Incidents |
|
|
146 | (1) |
|
Technical Controls and Containment |
|
|
146 | (1) |
|
|
147 | (2) |
|
11 Technical Email Controls |
|
|
149 | (16) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Domain Keys Identified Mail |
|
|
150 | (5) |
|
|
155 | (3) |
|
Domain-Based Message Authentication, Reporting, and Conformance |
|
|
158 | (3) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
Email Filtering Technologies |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
12 Producing Threat Intelligence |
|
|
165 | (18) |
|
|
166 | (1) |
|
Analyzing a Phishing Email in OTX |
|
|
166 | (1) |
|
|
167 | (1) |
|
Analyzing the Email Source |
|
|
168 | (1) |
|
|
169 | (3) |
|
Testing a Potentially Malicious Domain in Burp |
|
|
172 | (4) |
|
Analyzing Downloadable Files |
|
|
176 | (1) |
|
Conducting OSINT for Threat Intelligence |
|
|
177 | (1) |
|
|
177 | (1) |
|
Identifying Malicious Sites on WHOIS |
|
|
177 | (2) |
|
Discovering Phishes with PhishTank |
|
|
179 | (1) |
|
|
180 | (1) |
|
Consolidating Information in ThreatMiner |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (4) |
|
|
187 | (6) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Mitigation or Remediation |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
High-Value Assets Discovered |
|
|
192 | (1) |
|
|
192 | (1) |
|
C INFORMATION-GATHERING WORKSHEET |
|
|
193 | (4) |
|
|
197 | (4) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
E EXERCISES TO IMPROVE YOUR SOCIAL ENGINEERING |
|
|
201 | (4) |
|
Help a Random Stranger and Then Prompt for "Flags" |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Public Speaking/Toastmasters |
|
|
202 | (1) |
|
Do OSINT Operations on Family and Friends |
|
|
202 | (1) |
|
Compete in Social Engineering and OSINT CTFs |
|
|
203 | (2) |
Index |
|
205 | |