Twenty Year Anniversary


Posted Aug 17, 1999

Bernz's Social Engineering Intro: Social Engineering Intro, History and Suggested Reading.

tags | paper
MD5 | 0d729fb371e26d346c7a692b292cff20


Change Mirror Download
<HTML><body bgcolor="000000" text="ff22433" link="9900cc" vlink="#22aa22" 
<TITLE>Bernz's Social Engineering Intro Page</TITLE>
<H1><CENTER>Bernz's Social Engineering Intro and stuff</CENTER></H1>
<CENTER><H2>Intro and History</H2></CENTER><p>
Social engineering has been around in many forms since the beginning of time. The bible has a story of a great
social engineer in the book of Genesis. Jacob (Also known as First Hacker among scholars. Geeky and clever, by the way) wanted
to get a birthright (information) from his father. His father wanted to give it to his dumb and brutal hunter brother (the biblical NSA).
Jacob disguised himself as his brother and fooled his dad. Then he ran away to escape the persecuation. He then went on to
great things. So there. The NSA should suck that. The bible supports us. Maybe the pope reads 2600.
Long before computers, there have been hackers, of course. They weren't called that. But they were
people who manipulated technology to new ends. Of course, they used social engineering. How did the
first telegraph intercepters get ahold of the lines? they conned their way.
Social engineering is important. A computer can seize things along phone lines, but only someone
who is adapt at manipulating the real world can really get that far. What about things not on
the computers? Papers and files and the like. How do you get them? What about passwords?
What about closed terminals, bypassing security guards, tricking secretaries. It's all social engineering.
According to The Fugitive Game, Kevin Mitnick, one of the most renowned hackers, did most of his
work through social engineering. Only the last 15% or so was on the computer. The rest was scamming
phone agents for codes. It works.
Dumpster diving, phone scams, fake mail, security bypassing. It's all valid and it works. Next time
you have trouble accessing a password, try a little social engineering. It's good stuff.
Aside from this document, few things have been written about social engineering. There are related writings, though.
First, one should be familiar with the workings of computers. Read some computer stuff so you don't sound like an
imbecile. Check out these works, too.
Sherlock Holmes stories: He could fool the shit out of anyone. Check out The Case of The Bohemian Scandal
to see what I mean.
How to Make Friends and Influence People: I forget the author's name. Forget the make friends. Manipulation is what counts.
Psychology books: Get em from your school and library. Look at the Dyadic communication sections. This will teach you how to
interact with real people in case you hackers aren't used to it.
Interpersonal Communication by Joseph Devito: Interpersonal communication predicts trends in the way people speak. It's amazing
to see what kind of things we do and how much of a pattern there is.
Seinfeld and Men Behaving Badly: yes, seinfeld. Watch George think on his feet. He's got a rapid fire style of thinking
that while silly at times, can be a great asset for making up stories. Men Behaving Badly is cool because it's funny and
Rob Schneider's does some heavy lying and engineering like George.
Diff'rent Strokes: Nothing to do with Social engineering. Just cool as hell. Wachoo talkin' bout, Willis?


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By