Exploit the possiblities


Posted Aug 17, 1999

Bernz's Social Engineering Intro: Social Engineering Intro, History and Suggested Reading.

tags | paper
MD5 | 0d729fb371e26d346c7a692b292cff20


Change Mirror Download
<HTML><body bgcolor="000000" text="ff22433" link="9900cc" vlink="#22aa22" 
<TITLE>Bernz's Social Engineering Intro Page</TITLE>
<H1><CENTER>Bernz's Social Engineering Intro and stuff</CENTER></H1>
<CENTER><H2>Intro and History</H2></CENTER><p>
Social engineering has been around in many forms since the beginning of time. The bible has a story of a great
social engineer in the book of Genesis. Jacob (Also known as First Hacker among scholars. Geeky and clever, by the way) wanted
to get a birthright (information) from his father. His father wanted to give it to his dumb and brutal hunter brother (the biblical NSA).
Jacob disguised himself as his brother and fooled his dad. Then he ran away to escape the persecuation. He then went on to
great things. So there. The NSA should suck that. The bible supports us. Maybe the pope reads 2600.
Long before computers, there have been hackers, of course. They weren't called that. But they were
people who manipulated technology to new ends. Of course, they used social engineering. How did the
first telegraph intercepters get ahold of the lines? they conned their way.
Social engineering is important. A computer can seize things along phone lines, but only someone
who is adapt at manipulating the real world can really get that far. What about things not on
the computers? Papers and files and the like. How do you get them? What about passwords?
What about closed terminals, bypassing security guards, tricking secretaries. It's all social engineering.
According to The Fugitive Game, Kevin Mitnick, one of the most renowned hackers, did most of his
work through social engineering. Only the last 15% or so was on the computer. The rest was scamming
phone agents for codes. It works.
Dumpster diving, phone scams, fake mail, security bypassing. It's all valid and it works. Next time
you have trouble accessing a password, try a little social engineering. It's good stuff.
Aside from this document, few things have been written about social engineering. There are related writings, though.
First, one should be familiar with the workings of computers. Read some computer stuff so you don't sound like an
imbecile. Check out these works, too.
Sherlock Holmes stories: He could fool the shit out of anyone. Check out The Case of The Bohemian Scandal
to see what I mean.
How to Make Friends and Influence People: I forget the author's name. Forget the make friends. Manipulation is what counts.
Psychology books: Get em from your school and library. Look at the Dyadic communication sections. This will teach you how to
interact with real people in case you hackers aren't used to it.
Interpersonal Communication by Joseph Devito: Interpersonal communication predicts trends in the way people speak. It's amazing
to see what kind of things we do and how much of a pattern there is.
Seinfeld and Men Behaving Badly: yes, seinfeld. Watch George think on his feet. He's got a rapid fire style of thinking
that while silly at times, can be a great asset for making up stories. Men Behaving Badly is cool because it's funny and
Rob Schneider's does some heavy lying and engineering like George.
Diff'rent Strokes: Nothing to do with Social engineering. Just cool as hell. Wachoo talkin' bout, Willis?


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    6 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By