IntermediateSocial EngineeringOSINTPentesting

Practical Social Engineering

A Primer for the Ethical Hacker

4 / 5

Joe Gray's working manual for the social-engineering side of red team and threat intel: OSINT-driven recon, pretexting, phishing infrastructure, and the legal and ethical boundaries that separate professional work from criminal activity.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Authors
Joe Gray
Published
2022
Publisher
No Starch Press
Pages
240
Language
English

Read this if

Red teamers, fraud investigators, and threat-intel analysts who need to operationalize social engineering as a discipline rather than a stunt. Strongest for the OSINT-to-pretext pipeline — Gray shows how recon directly shapes what your call sounds like.

Skip this if

Readers wanting Mitnick-style war stories. Gray writes like a practitioner, not a memoirist; the book is procedural and careful, not dramatic. Also light on adversarial deepfake / voice-clone tradecraft, which is where the field has moved since 2022.

Key takeaways

  • Recon is the engagement: a pretext that doesn't survive contact with the target's reality is a recon failure, not a delivery failure.
  • Documentation, scoping, and consent are not bureaucratic overhead; they are what separate professional social engineering from social engineering.
  • OSINT and SE are the same workflow viewed from two sides — what you can find is what you can credibly claim to know.

Notes

Pair with The Art of Deception (Mitnick) for the human-side stories and with OSINT Techniques 11e (Bazzell) for the recon stack the pretexts depend on. Gray's Advanced Persistent Security podcast and the layer8 conference circuit are the live-practitioner companion. Most useful read alongside an actual engagement — the chapters land differently when you have a target binder open beside the book.