Salute, carders, in the scientific literature, social engineering is understood as a set of approaches of applied social sciences, focused on the purposeful change of organizational structures and institutions.
The experience of carrying out socio-economic reforms in our country and abroad...
Salute, carders, now we will talk about social engineering and trust as a human factor.
The reasons why email addresses or social media accounts are taken away are completely different. But when close people found out my reason, I received condemnation. To some extent, I always understood that...
Salute to those who like to break someone else's account, as you know, the main objection of people with whom you work is: "it's expensive." How to react when you hear a reproach about the cost of the service? Here are the answers that actually work:
"Expensive" is a relative term. If you can...
1.) With the help of SE, you can get what you want from a person, of course, if your skill in this matter is much higher. You can divorce any girl for sex, or an oligarch for a Rolls Royce and a house in the Maldives, who will not even guess that you have divorced him.
2.) With the help of SE...
Further from the author's words:
A small introduction.
Information is one of the most important assets of the company. Information may constitute a commercial secret of the company, i.e., under existing or possible circumstances, increase revenues, avoid unnecessary expenses, maintain its...
Here is an interesting article from the forum.
Further from the author's words:
I think everyone understands that in the scam business, the main problem is distrust on the part of the client. It is this trust that we will earn in a very rough and elegant way at the same time. I will not...
Here is literature that will help you improve your social engineering skills and better understand people and their psychology.
Further from the author's words
- The book in your hands contains many entertaining and instructive stories that reveal traditional methods of deception and...
In this issue we will talk about the required level of social engineering to get money back for packages from online stores. These tips are useful in other areas as well. The main thing is practice!
Let's go
1. "Ask for more and get what you need."
The secret to the success of this method is...
Breaking down 10 simple social engineering recipes.
Social engineering is usually considered part of a targeted attack, but what if such schemes are applied en masse? I developed and tested ten of these scenarios to understand how people will react to them and what the consequences might be.
I...
Companies often build cyber defense, focusing primarily on technical attack vectors. Such systems can have a high level of maturity and appear reliable, but at the same time remain vulnerable to one of the most dangerous threats - social engineering based on the manipulation of human...
The great schemer Ostap Bender honored the criminal code. He preferred psychological tricks to banal robbery, so that the victims of his charm voluntarily give the keys to the apartments where the money is. Later, a special name was invented for such machinations - social engineering. We will...
Fear is the most powerful emotion. Absolutely everyone has their own specific phobias and this fact speaks volumes. But the most important thing is that we can use it.
Throughout human existence, fear has ruled it. Fear of being killed, robbed, exiled. Fear of the collapse of the country or...
Talk about social networks. engineering can be continued indefinitely, but this will not protect you from intruders of all stripes. Among them, there are such talented guys who use non-standard and sophisticated methods. There are no typical counteractions to social engineers. Each situation...
Amigos, I have already read many topics and articles in various forums dedicated to SI and none of them turned out to be exhaustive. This is because this discipline cannot be simply taken and learned and become a guru. This needs to be learned constantly. Teaching ALWAYS consists of studying...
Bandits, do you know how to make one reckon with one correct look, how not to succumb to pressure from other people and even the most vile acquaintances to communicate with sincere sympathy and kindness? I present to you several ways to manage people, this is really useful for everyone, both in...
Almost all articles on social engineering describe some specific case from questionable practice. In this article I will try to focus the reader's attention on the math part: to tell how the brain works when making a decision, how to influence this decision and what technologies can automate the...
You and I communicate with different people, and each has its own view of things and their own ways to get what you want. Here are the five most common types of manipulation - recognize yourself in the situations described and don't get caught!
A bad person is a bad argument
Here is a very...
Social engineering is a method of manipulating the thoughts and actions of people. It is based on the psychological characteristics of the individual and the laws of human thinking.
Sometimes you can find the interpretation of social engineering as a method of unauthorized gaining access to...
Download with pictures: https://yadi.sk/i/jehvkJdk7yIwTg
Chapter 1: A Look into the World of Social Engineering Why This Book Is So Valuable
Overview of Social Engineering
Summary
Chapter 2: Information Gathering
Gathering Information
Sources for Information Gathering Communication Modeling...