Knowledge Base

The Social Engineer's Playbook: A Practical Guide to Pretexting

Written by
Jeremiah Talamantes

The Social Engineer’s Playbook was written by RedTeam Security founder and CEO, Jeremiah Talamantes. It is a practical guide to pretexting and a collection of Social Engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools, and expert guidance in this book.

Available On Amazon In Multiple Formats

About The Social Engineer’s Playbook

The Social Engineer’s Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, Security Managers, CISOs and Security Analysts. Learn how to build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others.

This book covers a very brief introduction to tools, such as: Maltego, Social-Engineer Toolkit, Dradis, Metasploit and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to good use.

About The Author, Jeremiah Talamantes

Jeremiah Talamantes has nearly 20 years in the IT security industry. He has a masters degree in Information Security & Assurance and an executive business education from the University of Notre Dame, Mendoza School of Business. Jeremiah is an active security researcher and an adjunct faculty member at Norwich University, College of Graduate Studies in Information Security & Assurance. He has held numerous leadership roles including CISO and expert consultant to several Fortune 500 companies. He is a CISSP, CCISO, CEH, CHFI, and CCENT.

Jeremiah Talamantes On Amazon – See All His Books

Featured On

National TV news and media outlets often consult with us for our expertise as a boutique, high-touch ethical hacking firm highly trained in a narrow field of cybersecurity. Please click on any logo below to view the featured story.

Get your FREE security evaluation today. Learn how our experts can reduce your organization's security risk

Test the effectiveness of your own security controls before malicious parties do it for you. Our security experts are here to help — schedule a call today.