Social Engineering - Christopher Hadnagy [197]
Top Secret 1
Top Secret 2
halo effect
hand gestures in deception
hand placement
hands/feet, interrogation and
happiness
smile, true versus fake
harvesting
head position, interrogation and
hearing
versus listening
retention and
hesitation in deception
Hewlett-Packard, pretexting example
Hogan, Kevin
human buffer overflow
embedded commands
fuzzing
human infrastructure
humiliation
I
ICanStalkU.com
identifying attacks
identity thieves
ripped up check in car
ideological incentives
imagination of listener
incentives for manipulation
financial
ideological
social
indebted feelings, reciprocation and
indifferent approach to interrogation
indirect approach to interrogation
influence. See also persuasion
authority
legal authority
organizational authority
social authority
symbols of
Cialdini, Robert
commitment
concession
contingent concessions
donation requests
installments
label concessions
negotiation and
reciprocity
conditioning, marketing
consensus
consistency
emotions and
flexibility and
framing
alignment
amplification
bridging
extension
politics
protest
relationships
relevance
subliminal
tasks
transformation
uses
fundamentals
goals
Hogan, Kevin
internal dialog and
Langer, Ellen
liking and
first impressions
physical attractiveness
manipulation
anxiety
color
conditioning
control over environment
definitions
diversion
doubt
emotional responses
guilt
humiliation
incentives
intimidation
loss of privilege
Motrin recall
planogram
positive
powerlessness
product placement
shoppers
social anxiety disorder campaign
suggestibility and
uses
NLP and
obligation
rapport
reciprocation
ask for what you want
giving away something
indebted feelings
scarcity
economics
intentional short supply
meat salesman
restaurants
social events
urgency
sensory acuity
social proof
Candid Camera
laugh tracks
pain tolerance
sales
similarity
tip jar salting
uncertainty
surroundings
tactics
information gathering
BackTrack
BasKet
Dradis
coffee shop conversation
commitment and consistency
communication modeling and
elicitation and
observation
pretexting and
sources
websites
information value
installments on concessions
instructions, stories as
insurance company empathy
intentional short supply of product
internal dialog, influence and
Internet fraud, social engineering and
interrogation
aggressive approach
alternate route
baseline
behavior changes
body posture
combination approach
denials
Department of Defense
direct approach
egotistical approach
emotional approach
end goal
environment control
exaggeration approach
eyes
face-saving approach
gestures
anchoring
arm/hand placement
cultural differences
mirroring
hands/feet
head position
indifferent approach
indirect approach
versus interview
listening
distractions
feedback
versus hearing
interrupting
paying attention
proof
reflective responding
responses
logical approach
mouth/lips
objections
positive confrontation
prep questions
primary sense
professional tactics
pronoun use
response time
signs, groups
skin color
sympathetic approach
theme development
verb tense
voice
wedging the alibi approach
words
interview versus interrogation
intimidation
IP addresses, servers, hosting
K
Kaspersky Labs, social networks
key phrases, matching
kindness, rapport building and
kinesthetic thinker
sub-modalities
touching objects
Kmart’s planogram
knowledge
assumed
rapport and
Kurgan, Murgis
L
labeling
Lakoff, George
Langer, Ellen
mindlessness
laugh tracks, social proof and
law of expectations
lawyers
leaders, social authority and
leading questions
leads, warm leads
legal authority
legal issues, pretexting
Li, Wen
liking
first impressions
influence and
marketing and
physical attractiveness and
steps to get people to
Tupperware parties
lips. See also mouth/lips
listening
distractions
feedback
versus hearing
interrupting
paying attention
proof
rapport building and
responses
reflective responding