Whitepaper called Social Engineering - The Human Factor. It documents suggested phases of the social engineering lifecycle and associated techniques for implementation.
461544be2738e4d8abf609851dadb8d3da3588cb53e8c180e81e7d7b8e0989c9
The Psychology of Social Engineering: Text of Harl's Talk at Access All Areas III, 05/07/97
42cfd17015ac8fd854a933233ba82f69f4153d8095961f915ee9526a5f91c553
Video Cameras and Social Engineering: Another Excellent Tutorial by Bernz.
0904c170ee137f0705f7d699ec5039749bcc5f4f31a3b4d8a2876d4a47ec2a7e
Get Your FBI File: fill out the online application.
a2e82bd1d486e08b7beb93b572cac621ca0e32421dfa33ba54928d48e07042cd
How to locate people ONLINE...: An excellent step by step tutorial on how to track people down using Internet tools.
30e41a20fbdab5e80c1241a8fccbb0ed0bdadfcc5ebb1a1e6ff0182633d8c620
Internet Mind Games: The art of linguistic programming, and social engineering Internet traffic.
953e815ce22e0f2fe68294ac3a3e3694af3bb313f73925bf39d6c7b05027cf2f
The Rules of DisInformation - The Politician's Credo: A complete guide to the "arts" of social engineering, FUD, and disinformation, for the aspiring politician, or anyone else who desires to crush the rest of the world, one person at a time, to succeed.
c266f2cb95ef88ca101e734a43051da633b84de0b0f78872c77c30baeca31b83
Social Engineering Just a new twist on an old con game. From the U.S. Department of Energy's Computer Incident Advisory Capability (CIAC) Information Bulletin
2f23b42f1709c4b663cfba13bfb3f2069acb68529d27c3843c1d62c1b5268c5a
Security: Cracking a Social Engineer Enterprising thieves use a variety of common techniques to pilfer information.
b922e4be553f2494cf81e5f140a3b9673913bb59b46b2fba1a8e1498d84036c2
THE COMPLETE SOCIAL ENGINEERING FAQ! Excellent text written by bernz, a good personal friend and a master social engineer/bullshit artist. Turn your head for a second and your wife is in his bed!
9505a67a3c63130f19073b5defa8d491215e6498850a9e6e59df77e05ef2c220
Bernz's Social Engineering Intro: Social Engineering Intro, History and Suggested Reading.
062f706e982c8acb7f6b01e32c2ff1185bc2f978906e2eba24c8ec3b6cd5869d
Bernz's Social Engineering Exploits: Revenge, Corporate Stuff, Payroll Scams, Garage Break-Ins.
09f4083be5ef7e872fa00fe609021d179d7f0cc70bb996b0034b14256f6c9eb5
Bernz's 10 Big Social Engineering Tips: The Basics you need to remember at all times.
a5272a138daee47c6ae7d98b1b80bb15438f122205f0c16d131e34e947cfa035