Conoce todo sobre Hacking con Ingeniería Social. Técnicas para hackear humanos


Price:
Sale price$26.20

Description

Existe amplia informaci n sobre Ingenier a Social en internet y otros medios (Description in English below).

Lo que diferencia este libro de la literatura existente es precisamente la descripci n de las pr cticas y herramientas que constituyen el punto de partida para quien se inicie en esta disciplina.

Aqu se describen todo tipo de t cnicas, f sicas y l gicas, para perpetrar ataques basados en Ingenier a Social: phising, obtenci n de informaci n a trav s de fuentes abiertas (OSINT), t cnicas de manipulaci n de personas, operaciones psicol gicas (PSYOPS), m todos de suplantaci n, detecci n de mentiras, programaci n neuroling stica (PNL), lockpicking, etc.

Description in English: Currently, the market has a wide range of systems, products and services focused on computer security: antivirus, firewalls, IDS, WAF, etc. All these measures are indispensable and have become a priority for any company or organization in order to secure their assets, but Social Engineering relates to the advantage that techniques can be used as an attempt against the vulnerabilities inherent to human beings, and as is well known, there is no patch or update that offers effective protection against this type of attack.

What firewall could be installed in a human brain? With what rules would you configure it? Why use complex systems in developing hacking techniques when a phone call could provide us with an administrator password?

This is one of the techniques that can be followed by a hacking specialist through Social Engineering, who will surely not waste time investigating complex attack vectors, exploits or Zero Day vulnerabilities if a friendly receptionist can be easily convinced to insert an infected USB into a company PC, or for a saturated telephone operator of a telecommunications company to provide personal details of a subscriber.

There is a lot of information about Social Engineering in different books and on the Internet. The differentiating element of this book is the importance given to the practices and tools that someone starting out in this discipline should know as a starting point. Throughout this book, all kinds of techniques, physical and logical, to perpetrate attacks based on Social Engineering will be described: phishing, obtaining information through open sources (OSINT), techniques of manipulation of people, psychological operations (PSYOPS ), impersonation methods, lie detection, neurolinguistic programming (NLP), lockpicking, etc.

Author: Carlos a. Barbero Muñoz, Antonio Ángel Ramos Varón
Publisher: American Book Group - Ra-Ma
Published: 03/11/2020
Pages: 208
Binding Type: Paperback
Weight: 0.75lbs
Size: 9.61h x 6.69w x 0.44d
ISBN13: 9781681657493
ISBN10: 168165749X
Language: Spanish
BISAC Categories:
- Education | Computers & Technology

This title is not returnable