Posts

Showing posts with the label Social_Engineering

Social Engineering In Practice

Image
If I were to describe this simply it would be "A Primer on How to Con People: But made for the good guys" I made a prior video about some useful theories that are utilized by social engineers, but it was more tools in a toolbox than a framework that can be used. So I went ahead and put something basic together that if followed can be used to create your own social engineering plan. It comes from real world examples, and will hopefully allow others to recognize social engineering attacks. It is still pretty general and focuses on information gathering rather than executing the exploit steps, but those can still be seen in many of the example videos that are included. It's good enough info to get the general idea of how it works, how quick it is, and how few barriers there are against many social engineering exploits. You can follow along with the slides here .

Social Engineering Theories

Image
This video covers several useful theories and principles used in social engineering. Think of it as building blocks that can be used. Quite a bit of this comes from scholarly work in psychology. It contains brief overviews of specific topics, definitely look into it more for a better understanding. This video was produced for academic purposes for identifying Social Engineering practices. This is not an endorsement of any illegal activity.   I think the part from 8:22 on is the most informative since it comes from a research paper I found specifically about social engineering attacks. Covers: +Mere Exposure Effect (0:47) +Theory of Planned Behavior (4:04) +Modes of Communication Styles (meh) +Anatomy of Social Engineering Attacks (8:22) *Principles of Persuasion (Authority, Reciprocity, Conformity, Commitment, Scarcity) (9:04) *Frequency of Persuasion Principles used (16:23) *Number of steps used before compliance (17:51) *Occurrence of principles by ste...