Penetration Testing mailing list archives

Re: Social Engineering ... ?


From: "Jay D. Dyson" <jdyson () treachery net>
Date: Mon, 22 Nov 2004 16:14:02 -0800 (PST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 22 Nov 2004, Bones wrote:

I am trying to find some good resources for social engineering methodologies and such performed as part of pen-test work.

Books, links, previous SF posts (date/subject) etc. are all welcome.

        Google is your friend.

        http://www.google.com/search?q=%22social+engineering%22

Also see Chapter 5 of "Hack-Proofing Your Web Applications." Part of it addresses techniques of social engineering. (And if you find it useful, you're welcome.) :)

- -Jay

   (    (                                                        _______
   ))   ))   .-"There's always time for a good cup of coffee"-.   >====<--.
 C|~~|C|~~| (>----- Jay D. Dyson -- jdyson () treachery net -----<) |    = |-'
  `--' `--'  `---- Doves fly in flocks.  Eagles fly solo. ----'  `------'

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (TreacherOS)
Comment: See http://www.treachery.net/~jdyson/ for current keys.

iD8DBQFBooDPBYoRACwSF0cRAnzKAJ9OpGOBQ92jOZS9P9QtbULaRShZWQCfXLWF
aNf0uqIH/CoWQLZkn+IGM6M=
=fYX6
-----END PGP SIGNATURE-----


Current thread: