Exploit the possiblities


Posted Aug 17, 1999

Bernz's Social Engineering Intro: Social Engineering Intro, History and Suggested Reading.

tags | paper
MD5 | 0d729fb371e26d346c7a692b292cff20


Change Mirror Download
<HTML><body bgcolor="000000" text="ff22433" link="9900cc" vlink="#22aa22" 
<TITLE>Bernz's Social Engineering Intro Page</TITLE>
<H1><CENTER>Bernz's Social Engineering Intro and stuff</CENTER></H1>
<CENTER><H2>Intro and History</H2></CENTER><p>
Social engineering has been around in many forms since the beginning of time. The bible has a story of a great
social engineer in the book of Genesis. Jacob (Also known as First Hacker among scholars. Geeky and clever, by the way) wanted
to get a birthright (information) from his father. His father wanted to give it to his dumb and brutal hunter brother (the biblical NSA).
Jacob disguised himself as his brother and fooled his dad. Then he ran away to escape the persecuation. He then went on to
great things. So there. The NSA should suck that. The bible supports us. Maybe the pope reads 2600.
Long before computers, there have been hackers, of course. They weren't called that. But they were
people who manipulated technology to new ends. Of course, they used social engineering. How did the
first telegraph intercepters get ahold of the lines? they conned their way.
Social engineering is important. A computer can seize things along phone lines, but only someone
who is adapt at manipulating the real world can really get that far. What about things not on
the computers? Papers and files and the like. How do you get them? What about passwords?
What about closed terminals, bypassing security guards, tricking secretaries. It's all social engineering.
According to The Fugitive Game, Kevin Mitnick, one of the most renowned hackers, did most of his
work through social engineering. Only the last 15% or so was on the computer. The rest was scamming
phone agents for codes. It works.
Dumpster diving, phone scams, fake mail, security bypassing. It's all valid and it works. Next time
you have trouble accessing a password, try a little social engineering. It's good stuff.
Aside from this document, few things have been written about social engineering. There are related writings, though.
First, one should be familiar with the workings of computers. Read some computer stuff so you don't sound like an
imbecile. Check out these works, too.
Sherlock Holmes stories: He could fool the shit out of anyone. Check out The Case of The Bohemian Scandal
to see what I mean.
How to Make Friends and Influence People: I forget the author's name. Forget the make friends. Manipulation is what counts.
Psychology books: Get em from your school and library. Look at the Dyadic communication sections. This will teach you how to
interact with real people in case you hackers aren't used to it.
Interpersonal Communication by Joseph Devito: Interpersonal communication predicts trends in the way people speak. It's amazing
to see what kind of things we do and how much of a pattern there is.
Seinfeld and Men Behaving Badly: yes, seinfeld. Watch George think on his feet. He's got a rapid fire style of thinking
that while silly at times, can be a great asset for making up stories. Men Behaving Badly is cool because it's funny and
Rob Schneider's does some heavy lying and engineering like George.
Diff'rent Strokes: Nothing to do with Social engineering. Just cool as hell. Wachoo talkin' bout, Willis?


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By