Goodreads helps you keep track of books you want to read.
Start by marking “Social Engineering: The Art of Human Hacking” as Want to Read:
Social Engineering: The Art of Human Hacking
Enlarge cover
Rate this book
Clear rating
Open Preview

Social Engineering: The Art of Human Hacking

3.84  ·  Rating Details ·  1,591 Ratings  ·  106 Reviews
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick--one of
ebook, 416 pages
Published November 29th 2010 by Wiley
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Social Engineering, please sign up.

Be the first to ask a question about Social Engineering

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Mar 30, 2011 Todd rated it it was ok  ·  review of another edition
Let me start by saying that Social Engineering is one of the two areas of information security where I have specialized (in addition to application security), so I was looking forward to this book, and, undoubtedly, I set my expectations too highly.

Here is a big part of where my excitement originated: this book is one of the first books to pull together commentary on the types of things social engineers have known and been doing. This book, as well as and _No Tech Hacking_ ar
I first became aware of the concept of Social Engineering when I read Ghost in the Wires My Adventures as the World's Most Wanted Hacker by Kevin D. Mitnick and I was blown away! It was very exciting – that guy has GUTS!

I wanted to read more about the technique, not necessarily with the goal of learning how to social-engineer people in mind, but rather to try and recognize the signs so I can detect if ever I am being social-engineered!

This book is quite thorough and there is no denying the material is interesting, but I found it too long. There was too much “telling me about wh
Atila Iamarino
Começa bem legal, com um monte de relatos sobre hacking social e como pessoas são manipuladas dessa forma. Com uma série de outras dicas. Mas o livro fica muito repetitivo, mais longo do que o necessário e investe muito em explicações de como a mente funciona e Programação Neurolinguística (PNL). Você vai estar melhor com o hacking social lendo o Kevin Mitnick, como a mente pode ser manipulada com o Dan Ariely e o Daniel Kahneman. Agora, sobre PNL, tenho séria descrença, mas ainda preciso ler es ...more
Feb 03, 2013 Trav rated it it was ok  ·  review of another edition
Shelves: saass, 667
An easy read.

The audience is not clear, but I do not believe it needs to be. The fact that the author repeatedly talks throughout about techniques you can use to social engineer, but then closes the book out with a chapter on "Prevention and Mitigation" highlighted, to me, that the book was designed more as a wake-up call to those, like the CEO he mentions in one of his case study, that believe themselves immune from the potentially negative effects of social engineering.

I find it interesting
Mar 14, 2011 Aija rated it liked it  ·  review of another edition
Shelves: educ
A typical american-style book - too much repetition and redundancy of words.
Other than that, it is a nice systematic review of social engineering methods.
And while reading this book I realized why we shouldn't share every bit of information about ourselves in social networks (it's not like I didn't know it, but now I understand it). However, not sharing information on social networks also is information that can be used, so I conclude with same as the author: security through education. Need to
Jonathan Jeckell
While the US government is fixated with all things cyber, this book shows how physical and technical security systems can easily be bypassed. It mainly trends to following professional penetration testers, but also provided insight into improving your ability to influence others, as well as protect yourself from predatory manipulation, like hoaxes, scams, spear phishing, etc. The part about how woefully inadequate most corporate information awareness courses are made me laugh out loud since it p ...more
Mar 10, 2011 Weston rated it it was amazing  ·  review of another edition
Shelves: read-in-2011
This was an excellent book. Normally, I don't read books like this one cover to cover. I browse through them, looking at interesting parts, and then they sit on my shelf until I want to reference something in them. That almost happened with this book. I read about half way through it back in March, and then started reading some other things. About a week ago, I picked it back up and had a hard time putting it down. The explanations in the book are great, and the material is fascinating. It is sc ...more
Jul 30, 2011 R.Z. rated it did not like it  ·  review of another edition
Christopher Hadnagy's worldview is suspect. Under the guise of showing his readers how to prevent falling prey to shysters trying to defraud them, he is really teaching his readers how to manipulate and fool people into doing what is wanted. Again and again he exhorts his readers to not break the law, yet much of what he recommends would be considered unethical and immoral by anyone who believes in respect for others. Bad stuff.
This book just amazing!!!
So much valuable information, very fun and easy to read! Priceless!
Must read if you do security audit or just interested in social engineering!
This is also one of the best psychological book so worth a look even if you not interested in IT
Douglas Matthews
Mar 31, 2014 Douglas Matthews rated it really liked it  ·  review of another edition
Chris Hadnagy provides an excellent primer into the world of social engineering. If you want to understand the threat, learn to think how the bad guys think. Plus, there are many aspects of social engineering that have perfectly legitimate uses and purposes in ordinary personal and business life.
Dec 13, 2011 Joycec rated it really liked it  ·  review of another edition
This book gives a good overview of how we get hacked and/or taken advantage of. It's great insight into how trusting we can be and how others can use this to exploit us. There are parts that are way too technical for most of us but overall the book was worth reading.
Ebrahim Elsharawy
With Social Engineering, you can get a lot of information about anyone you want! ... emails, phones, address, portraits and passwords !!!

The Internet makes our privacy in risk!, so we should reduce the use of social networking websites!


good book ...
Mar 20, 2011 Dan rated it it was amazing  ·  review of another edition
Shelves: infosec, psychology
I thought "Art of Deception" was the best book out there on the subject of social engineering, and then I read this.... Outstanding.
Apr 11, 2015 Jose rated it really liked it  ·  review of another edition
Shelves: non-fiction
Not bad. It was not a academical as I was thinking at first, it was more on the entertaining side.
Feb 13, 2012 John rated it liked it  ·  review of another edition
Interesting, but way too credulous on the NLP nonsense.
Mar 01, 2011 Dgg32 rated it it was amazing  ·  review of another edition
Nice facts, useful tipps.
Jan 26, 2017 Fernando rated it it was ok  ·  review of another edition
Shelves: audiobook
I do not recommend it. Is boring.
Anna Bradley
Mar 01, 2017 Anna Bradley rated it really liked it  ·  review of another edition
Shelves: psychology
A pleasant read and a particularly informative account on the subject. I actually had an opportunity to speak with the author personally where he admitted to have recently fallen a victim of a well orchestrated SE scam himself. Evidently staying in the game is a process that never dies and one or even a series of books will never be able to cover all aspects and even most recent techniques of social engineering (which is ironic to state while giving a public review on a social engineering book). ...more
Vytautas Ziedelis
very good book. tuns of information and advice
Luna TheQuibbler
Sep 23, 2016 Luna TheQuibbler rated it really liked it  ·  review of another edition
Shelves: psychology
Benjamin Donnachie
Repetitive and badly written in a conversational style. I stuck with this book until the end but wished I hadn't.
Sal Coraccio
Oct 13, 2015 Sal Coraccio rated it really liked it  ·  review of another edition
Shelves: pentesting
A well done overview with added depth in key areas - overall, an excellent resource for any IT professional and will provide utility for a penetration tester looking to strengthen the person-to-person attack vector.

This book is probably best served as paper, versus audio - or at least supplemented with the actual book. This is partly due to the many lists and references and partly due to the off-putting narration. It wasn't bad, but "good" isn't quite the right word either.

This book and further
Paulo Limp
Mixed feelings about this book. There is some very useful information in it, but at the same time it loses itself in some moments, becoming pretty boring. Probably it needs a good editor.

I've learned a lot about social engineering, including some stuff I believe I'lol be able to apply on my day-to-day activities. As the book says, not all social engineer attempt is malicious; doctors do it all the time to convince their patients to follow the correct treatment for their problems. I'm also convin
Steven Kempton
Quite a comprehensive overview and probably a good starter for those who have no experience with social engineering.
Jean Gonnella
Aug 09, 2012 Jean Gonnella rated it it was amazing  ·  review of another edition
I think e everyone that has the time should take the time to read or listen to this book on audio...i think the audio version is great...i This book provids insight on the weakest link in any security program. He shows that hacking access to a system doesn't mean the bad guys even need to touch a keyboard. They just a phone and with a bit of research are able to talk their way into gaining access.

The author clearly outlines the steps of a social engineering attack. The book starts with the resea
Troy Swinehart
Jan 22, 2013 Troy Swinehart rated it really liked it  ·  review of another edition
Book 7 of 12 This one should be cool as all get out! I am the puppet master (evil laugh)...well at least I'll figure out why I'm the puppet. Sorry got carried away after reading Faust.

Good thing I was ahead on my reading schedule for the year....yikes this is dense. Probably going to hot track the rest of this since Hadnagy has a tendency to repeat everything multiple times. Right now I am suggesting that if this topic is a casual interest for you...pass on this book...or at best skim it. (For a
Nate Huston
Nothing earth-shattering here. The book is a whole lot less about the contemporary cyber-based social-engineering that many think about when they hear the term (for many of us, that term was probably introduced in the context of cyber scams) and a whole lot more about the art of social interaction.

The table of contents gives a good overview of the framework. The two most interesting chapters are on elicitation (arranging an interaction in order to get the results you're looking for) and influen
Cihan Koseoglu
Feb 09, 2017 Cihan Koseoglu rated it it was amazing  ·  review of another edition
I read the whole book for the first time, I read like 30-40% of it couple years ago and really liked the stories. There are a lot of lessons for not just engineers and hackers, but also for ordinary peeps who desire to have better human interaction skills.
Apr 19, 2013 Jennifer rated it it was ok  ·  review of another edition
I know nothing about hacking or social engineering & it's scary to think these devious people actually exist!! It reads a bit weird with things repeated (I listened to the audiobook) where it seemingly stops & begins a new chapter but then talks about something that has already been described, maybe just the way it's been done I'm not sure. Anyway, I think it was good for me in terms of awareness of scams & tricks but I was completely lost in areas where it was seemingly a step by st ...more
Jun 10, 2015 G rated it it was ok  ·  review of another edition
Shelves: psychology
"Forget what you've heard about human beings having descended from the apes. We didn’t descend from apes. We are apes." Sex at dawn.

Refreshing literature for sales professionals. To state it a bit much seriously, social engineering is a field that will become more and more important in our overpopulated world. We are facing exponential leap in human population growth, and it doesn't seems that this situation is going to improve. There is a growth that we can't control, or prevent from escalation
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Metasploit: The Penetration Tester's Guide
  • Hacking: The Art of Exploitation
  • The Branded Mind: What Neuroscience Really Tells Us about the Puzzle of the Brain and the Brand
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • The Psychology of Attitude Change and Social Influence
  • The Buying Brain: Secrets for Selling to the Subconscious Mind
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
  • Brainfluence: 100 Ways to Persuade and Convince Consumers with Neuromarketing
  • Rtfm: Red Team Field Manual
  • Beyond Culture
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Neuromarketing: Understanding the Buy Buttons in Your Customer's Brain
  • Out of Character: Surprising Truths About the Liar, Cheat, Sinner (and Saint) Lurking in All of Us

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book