Existe amplia informaci???n sobre Ingenier???a Social en internet y otros medios (Description in English below). Lo que diferencia este libro de la literatura existente es precisamente la descripci???n de las pr???cticas y herramientas que constituyen el punto de partida para quien se inicie en esta disciplina. Aqu??? se describen todo tipo de t???cnicas, f???sicas y l???gicas, para perpetrar ataques basados en Ingenier???a Social: phising, obtenci???n de informaci???n a trav???s de fuentes abiertas (OSINT), t???cnicas de ...
Read More
Existe amplia informaci???n sobre Ingenier???a Social en internet y otros medios (Description in English below). Lo que diferencia este libro de la literatura existente es precisamente la descripci???n de las pr???cticas y herramientas que constituyen el punto de partida para quien se inicie en esta disciplina. Aqu??? se describen todo tipo de t???cnicas, f???sicas y l???gicas, para perpetrar ataques basados en Ingenier???a Social: phising, obtenci???n de informaci???n a trav???s de fuentes abiertas (OSINT), t???cnicas de manipulaci???n de personas, operaciones psicol???gicas (PSYOPS), m???todos de suplantaci???n, detecci???n de mentiras, programaci???n neuroling??????stica (PNL), lockpicking, etc. Description in English: Currently, the market has a wide range of systems, products and services focused on computer security: antivirus, firewalls, IDS, WAF, etc. All these measures are indispensable and have become a priority for any company or organization in order to secure their assets, but Social Engineering relates to the advantage that techniques can be used as an attempt against the vulnerabilities inherent to human beings, and as is well known, there is no patch or update that offers effective protection against this type of attack. What firewall could be installed in a human brain? With what rules would you configure it? Why use complex systems in developing hacking techniques when a phone call could provide us with an administrator password? This is one of the techniques that can be followed by a hacking specialist through Social Engineering, who will surely not waste time investigating complex attack vectors, exploits or Zero Day vulnerabilities if a friendly receptionist can be easily convinced to insert an infected USB into a company PC, or for a saturated telephone operator of a telecommunications company to provide personal details of a subscriber. There is a lot of information about Social Engineering in different books and on the Internet. The differentiating element of this book is the importance given to the practices and tools that someone starting out in this discipline should know as a starting point. Throughout this book, all kinds of techniques, physical and logical, to perpetrate attacks based on Social Engineering will be described: phishing, obtaining information through open sources (OSINT), techniques of manipulation of people, psychological operations (PSYOPS ), impersonation methods, lie detection, neurolinguistic programming (NLP), lockpicking, etc.
Read Less
Add this copy of Conoce todo sobre Hacking con Ingenier燰 Social. T to cart. $20.90, new condition, Sold by Ingram Customer Returns Center rated 5.0 out of 5 stars, ships from NV, USA, published 2020 by American Book Group - Ra-Ma.