This book by Christopher Hadnagy was a real eye opener to me. We see a lot of cases in our day to day that the whole infection process or an initial foothold in the victim’s network was done by “social engineering techniques” and we often look at it and say “probably just another email or malspam campaign”.

Well, we are not necessarily wrong, but this amazing book still gives us a pick of how the mind of a threat actor that is looking to extract something from a victim through social engineering works – How to make the victim feel comfortable, how to lead it to act and conclude the conclusion you want them to have and much more.

In addition, this book also takes a lot of use cases that happened in the past and enables us to learn from and to come with more knowledge and confidence to a suspicious email, website, forum, Telegram chat, you name it.

Link to this book on Amazon

Have fun and good luck!

To top