The Art of Deception: Controlling the Human Element of Security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and ...more
This book focuses on the human element of computer security. Reminding us that eve ...more
A number of problems prevented this book from being very good. The main problem is simply that Mitnick did not have enough material to fill an entire book. This book would have been better if it were shorter and simply one section in a larger book ab ...more
Reading ‘The Art of Deception’ is like hearing it straight from the horse's mouth. Kevin D. Mitnick, one of the legendary cyber desperado turned computer security consultant, takes the reader into the complex, supremely confident – often misunderstood as arrogance and curiosity ...more
Não é um livro tão útil atualmente, especialmente com as mudanças d ...more
The anecdotes are more interesting than entertaining, and all proceed by the same b ...more
Das Telefon in der Buchhandlung klingelt.
"Hallo, hier ist Jari von der Buchhandlung Soundso."
"Ja, hallo, hier ist Klaus von der Filiale am Ende der Stadt. Du, hier ist etwas ziemlich schief gelaufen und der Kunde tobt. Sein bestelltes Buch hätte hier bei uns sein sollen, ist es aber nicht. Er hat auch schon bezahlt und braucht es dringend jetzt. Ihr habt doch noch eines vorrätig, nicht wahr?"
"Haben wir, ja."
This book definitely irritated me as I had not thought about the detailed level of attacks folks have gone through. Thinking back, there have probably been ...more
Me crucé con este libro (está en la mula, por supuesto) y me lo he devorado en dos días. Hay una segunda parte, The Art of Intrusion, que parece que está incluso mejor.
Kevin Mitnick se hizo bastante famoso, para su desgracia, cuando le condenaron a unos cuantos años de cárcel por diversos delitos contra la seguridad electrónica de varias empresas y agencias estatales norteamericanas (nada grave según él, el holocausto informático según el fiscal). La Wikipedia (Kevin Mitnick, Kevin Mitnick ) cu...more
In the first chapter of his book, usually referred to as The Lost Chapter (As it wasn't published with the final version of the book), Kevin Mitnick tries to convince his readers that he is innocent – or at least ...more
It's clear that Mitnick thinks very highly of himself and his accomplishments, occa ...more
The common sense that computer geeks are often fat, unpopular with heavy glasses and nerdy faces is not applicable in "Social Engineer" category. Social engineer is someone with talent and understanding for both social behavior and technical command. He/she can infiltrate in a company system by manipulating human psychology (unshakeable confidence, empat ...more
Table of Contents
Part 1 Behind the Scenes
Chapter 1 Security's Weakest Link
Part 2 The Art of the Attacker
Chapter 2 When Innocuous Information Isn't
Chapter 3 The Direct Attack: Just Asking for it
Chapter 4 Building Trust
Chapter 5 "Let Me Help You"
Chapter 6 "Can You Help Me?"
Chapter 7 Phony Sites and Dangerous Attachments
Chapter 8 Using Sympathy, Guilt and Intimidation
Chapter 9 The Reverse Sting
Part 3 Intruder Alert
Chapter 10 Entering the Premises
Chapter 11 Combining Technology and Social Eng ...more
Some of the 'examples' used are repeated in Kevin's other book, Ghost in the Wires, which I read before this one. GitW is a good read, this one, not so much.....
As a nerdy kid growing up I was fascinated by computers and the then-emerging Internet. Dial-up to AOL and local BBSes had me feeling pretty fly. I remember stumbling onto the "Anarchist Cookbook", and finding a few issues of the hacker magazine 2600 at a Barnes and Noble. The checkout lady gave me a concerned frown and told me to be careful. Haha, joke was on her! I had no idea what I was reading.
Except for the parts about Kevin Mitnick, ...more
This email was sent to you for security reasons. We were not able to determine whether the previous login to ...more
While I picked this up completely voluntarily, reading it was a chore. It ...more
I'm sure a business owner who isn't tech-savvy could get a lot out of this book, it just wasn't aimed at me.
kevin amcanın yaptığı ve yaşadığı dönemde arkadaşları tarafından yapılan sosyal mühendislik hikayelerini bir araya getirip okuyucuya ders çıkarmasını sağlayan bir kitap. tabi günümüz insanı o zaman yaşayanlardan farklı bu kitapta bulunan saldırı şekillerinden çoğu şu an geçersiz ancak tabi bazılarının hala geçerliliği olmadığı gerçeğini değiştirmez.
Excellent examples of traditional "grifting" techniques being used as a compound attacks. Really highlights how effective the methods are, especially the way an attacker will build trust little by little.
Technical information somewhat dated, due to being published in 2002.
Goodreads is hiring!
Learn more »