O'Reilly logo

CEH: Certified Ethical Hacker Version 8 Study Guide by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10Social Engineering

  1. image X. Social Engineering
    • a. Types of social engineering
    • b. Social networking
    • c. Technology assisting social networking
    • e. Defensive strategies
    • f. Pentesting issues

So far in this book we have covered a lot of threats, but they have all been technological in nature. In this chapter, we will shift gears and discuss social engineering. Social engineering deals with the targeting and manipulation of human beings rather than technology or other mechanisms. This method is popular because the human element is frequently the weak part of a system and most prone to mistakes. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required