It is a great book on the human interactions, body tone, body language, and more. In other words how can a hacker call the target company and ask for passwords or user names and actually be given them. Well if the password is freely given to the hacker there is no defense for that.
Penetration testing are several acts on various computers and systems.
First in “recon” one checks the public profile of the company.
Use scan tools, nmap, hping, scapy, burp suite, and others to check the target computers out. (this is the Alpha scan)
Then one can use a few pre-built tools to review vulnerabilities like Nessus, maltegoo, Metasploit or Armitage(a good GUI to Metasploit), OWASP and Tshark/Wireshark are also good tools to review what is going on in the network. (Sigma scan)
Each tool can be used to further your knowledge of the network, or to find out more about how to investigate/exploit the systems.
Little by little a dossier is created with more and more information compiled.
Then at some point the pentester may also use some Social engineering. (custom scan – Omega scan)
Here is where the custom portion of a pentest occurs.
Incidentally the process of pentest “almost” mirrors the hackers methods.