Shop now Learn more Shop now Up to 50% off Fashion Prime Photos Shop now Learn More Shop now Halloween Pets Shop now Shop Fire Shop Kindle Voyage Listen in Prime Learn more Shop now
Start reading Social Engineering: The Art of Human Hacking on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device

Add Audible Narration
Social Engineering: The Art of Human Hacking Narrated by A. T. Chandler £15.79 £5.99

Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Image not available

Social Engineering: The Art of Human Hacking [Kindle Edition]

Christopher Hadnagy , Paul Wilson
4.3 out of 5 stars  See all reviews (25 customer reviews)

Print List Price: £23.99
Kindle Price: £17.09 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £6.90 (29%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.

Audible Narration

Switch back and forth between reading the Kindle book and listening to the Audible narration. Add narration for a reduced price of £5.99 after you buy the Kindle book.


Amazon Price New from Used from
Kindle Edition £17.09  
Paperback £19.19  
Audio Download, Unabridged £0.00 Free with Audible trial
MP3 CD £7.75  
Kindle Daily Deal
Kindle Daily Deal: Up to 70% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.

Book Description

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

Customers Who Bought This Item Also Bought

Page of Start over
This shopping feature will continue to load items. In order to navigate out of this carousel please use your heading shortcut key to navigate to the next or previous heading.

Product Description

From the Back Cover

"Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever–present dangers to your business and even to yourself. Truly groundbreaking."
Kevin Hogan, author of The Science of Influence: How to Get Anyone to Say "Yes" in 8 Minutes or Less

Discover the secrets of expert con men and human hackers

No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against.

This book covers, in detail, the world′s first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.

Tour the Dark World of Social Engineering

  • Learn the psychological principles employed by social engineers and how they′re used

  • Discover persuasion secrets that social engineers know well

  • See how the crafty crook takes advantage of cameras, GPS devices, and caller ID

  • Find out what information is, unbelievably, available online

  • Study real–world social engineering exploits step by step

"Most malware and client–side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it′s done by revealing the social engineering vectors used by today′s intruders. His book will help you gain better insight on how to recognize these types of attacks."
Kevin Mitnick, Author, Speaker, and Consultant

About the Author

Christopher Hadnagy is the lead developer of–, the world′s first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack– and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security′s penetration testing team.

Product details

  • Format: Kindle Edition
  • File Size: 3773 KB
  • Print Length: 411 pages
  • Page Numbers Source ISBN: 0470639539
  • Publisher: Wiley; 1 edition (29 Nov. 2010)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B004EEOWH0
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Enabled
  • Enhanced Typesetting: Not Enabled
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (25 customer reviews)
  • Amazon Bestsellers Rank: #108,715 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Author

Discover books, learn about writers, and more.

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

Most Helpful Customer Reviews
11 of 11 people found the following review helpful
5.0 out of 5 stars Outstanding coverage of a critical skill 26 Jan. 2011
By Nickfx
Pen testing and IT security assessments often cover less than 1/2 of the real world security problems experienced by modern day organisations. The risk posed by willing or unwitting employees disclosing information or acting as conduits to internal systems cannot be underestimated. Chris Hadnagy has been a regular conference presenter on the subject for several years and was very well placed to write this book. It is a well written collection of the primary skills and tools used by the accomplished Social Engineer which is a must read for security professionals and company managers alike.

Written in largely non-technical language but in such a way so as not to irritate the security specialist the book takes you on a roller-coaster of disparate yet somehow cohesive techniques and tools which can lead to a successful exploitation of an individual or company.

If you are learning about security or if its the way you learn your living, you need to read this book.
Comment | 
Was this review helpful to you?
Report abuse
4 of 4 people found the following review helpful
5.0 out of 5 stars Social Engineering Portal 2 Jan. 2012
By fl1bbl3
Format:Kindle Edition|Verified Purchase
A book containing the entire body of knowledge pertaining to Social Engineering is going to run to several volumes. Its such a wide subject encompassing a huge variety of topics that a single volume just isn't going to be able to cover them all in inordinate detail; even Microsoft canned Encarta when the Internet took off :). I therefore picked up this book hoping to gain an oversight into the field of Social Engineering, learn the most important aspects of it, and hopefully pick up some references for future study. It delivered on my expectations in spades.

It first establishes the framework of social engineering, something that I think is incredibly important. Yes you can learn individual elements but without understanding where they sit in a framework (where they are most prudent, what inputs you need and what outputs you can expect) you limit your overall effectiveness as/understanding of a social engineer. It then proceeds to take you through each of the elements in turn, delivering a precis and expanding on specific salient points. Every section is accompanied with copious references for further research and its clear that the author is intimately familiar with his material. Moreover, its also clear that he has a passion for the subject matter and this comes across well in the book.

Although written in a slight slant towards penetration testing, the author goes to great lengths to point out that in order to defend against something you need to understand how, where, and when someone will attack. Its something of an Infosec pastiche, but the Sun-Tzu quote "Know thine enemy better than one knows thyself" certainly applies here. As someone on the defence side, this book is invaluable in understanding how someone may use these techniques against us and should be a mandatory read for anyone tasked with creating an infosec program that really works.
Comment | 
Was this review helpful to you?
Report abuse
4 of 4 people found the following review helpful
5.0 out of 5 stars The weakest link 17 Aug. 2011
The value of this book cannot be underestimated. While the majority of technical security books focus on software and hardware security, this book addresses a factor which is often overlooked in today's security infrastructure: The human factor.
It shows how attacker's use methods and psychological tricks which allow them to gain access to environments which are technically quite secure and it does it in the best way possible: by combining real life examples (which read like a spy novel) with an academic approach, citing studies and research and all this is done in a very structured way.
Personally, I think the examples of lockpicking gear and GPS tracking stuff could have been omitted, since there are other books which address these and it leads us off topic, but on the other hand they prove some valid points and they serve as good examples/eye openers.
This book is highly recommended and also one of the very few books which can be read by the non-technical user who wants an insight on today's social engineering techniques.
Comment | 
Was this review helpful to you?
Report abuse
2 of 2 people found the following review helpful
5.0 out of 5 stars Very Impressive! 27 Sept. 2011
By Higgsb
The publication is very well rounded giving a good brief description considering the complexity of the subject / practise of Social Engineering allowing for a good starting point for further indepth study.

In my opinion it is written in a way that makes you drive for a better understanding and in turn a wanting to pass on the knowledge (like any good Ethical Hacker).

The psychological principles intrigued me most and has in fact caused me to examine nearly ever social encounter I have giving me a feel for the true nature of the conversation, and in some cases getting what i want (some what to my surprise). First I found myself drifting in my own thoughts with trying to take in and process every aspect of the conversation from visual cues to tone of voice causing the person talking to me to either go "errrr you ok" or "hello?" (depending on whether the conversation was held over the phone in person etc).

Regardless of your knowledge or abilities in Social Engineering. After reading this book you will start picking up signals and even using some of the skills you have learnt. That's a promise.

It covers everything in once place and as mentioned previously its a great start for detailed study. Gives you all the direction you need.
Comment | 
Was this review helpful to you?
Report abuse
2 of 2 people found the following review helpful
Format:Kindle Edition
There are may resources that have tried to cover social engineering over the last few years, and I can honestly say that this blows them all out of the water.
This is a book that should be included in all business training, whether you are a CISO, CIO, or a member of a security team, what you will learn in this book will change your life, and the way that you look at security in general.
I can imagine that this book will also scare the hell out of a lot of readers, but Chris has put down on paper what the bad guys do, and how you can learn the same methods to be a successful social engineer, and also how to protect your organisation against these attacks.
Don't expect this book to instantly turn you into an expert social engineer, as these things take a lot of time and effort, but it gives you everything you need to become one.
All I can say is well done Chris, this is the book that the security and executive world has been waiting for.
This book really will change your life.
Comment | 
Was this review helpful to you?
Report abuse
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
5.0 out of 5 stars Five Stars
Very well written
Published 2 months ago by Ian
5.0 out of 5 stars Five Stars
My daughter is thoroughly enjoying this book
Published 5 months ago by RC
5.0 out of 5 stars Five Stars
Nice book!
Published 7 months ago by Haochen Zeng
2.0 out of 5 stars Hocus Pocus
Where are all the citations? The claims are too bold for the little evidence it provides. I'd say the author has taken the analogy of the Human mind being like a computer way too... Read more
Published 10 months ago by aibsaibs
5.0 out of 5 stars Price could be lower..
Well, haven't read it yet, anyway I'm so thrilled about start reading it.
Published 10 months ago by Jan Valecka
5.0 out of 5 stars and in good order thank
Arrived promptly, and in good order thank you
Published 13 months ago by Spike
5.0 out of 5 stars thought provoking, eye opener into the vulnerable human mind
Social engineering is used everyday, in every aspect of our life, without us even knowing at times! Not just by con men, hackers etc but sales reps, doctors, parents employers,... Read more
Published 20 months ago by daza166
1.0 out of 5 stars Bad overall, I would give it no stars if I could
This book offers no real insight and his background doesn't seem legit, which he implies he something to do with 'the real hustle'. Read more
Published 22 months ago by Joe Alt
2.0 out of 5 stars An Insult for the Intelligent Reader
The author attempted to write a broad book about all possible aspects of social engineering. As he touches all these topics in the book, he often treats subjects in a very shallow... Read more
Published 22 months ago by Fugu
5.0 out of 5 stars Brilliant
Well written and informative a must for any pen tester but interesting enough to be read by anyone. Highly recommended.
Published 24 months ago by Jason Smith
Search Customer Reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category