This book will focus on social engineering techniques that are favourite of both, White Hat and Black Hat hackers.