Online Book Reader

Home Category

Social Engineering - Christopher Hadnagy [200]

By Root 8266 0
engine

shoppers, manipulation

music loops

short supply of product

shove knives for lock picking

shredded documents

similarity, social proof and

simplicity in pretexting

skills, ingraining

skin color, interrogation and

Skitka, Linda

Slaney, Malcolm

Smart, Jamie

“The map is not the territory.”

smart phones, pictures, GPS location

SMCR (Sender-Message-Channel-Receiver) model

smiles

de Boulogne, Duchenne

true versus fake

Snow, David

frame amplification

social, definition

social anxiety disorder campaign

social authority

social engineering framework

social engineers

communication and

disgruntled employees

doctors

executive recruiters

governments

hackers

identity thieves

lawyers

microexpressions and

NLP use

penetration testers

psychologists

salespeople

scam artists

spies

thinking like

types

social incentives

social networks

tail-gaiting

social interaction rules

social media

Blippy

information gathering

social media outlets, job information

social proof

Candid Camera

celebrity endorsement of product

Cialdini, Robert

laugh tracks

pain tolerance

sales and

similarity and

tip jar salting

uncertainty and

Social Security Administration hack (Mitnick)

Social Security Number

background checkers and

illegal use

software

profiling software

Maltego

password profilers

searching Internet for

security patches

update maintenance

speech pattern matching

spies

SpoofApp

SpoofCard

spoofing

Caller ID

caller ID

SpyHawk SuperTrak GPS Worldwide Super Trackstick USB Data Logger

reading data

stamp collection

steepled fingers

Stevens, Tom G., self-confidence

stoic eyes

stories as direct instructions

subliminal framing

suggestibility of target

increasing

pen clicks

surprise

fear and

symbols of authority

sympathetic approach to interrogation

T

tail-gating

tapping/drumming fingers

targets

attention, holding

baseline

behavior and your emotion

emotional attachments

environment, controlling

intimidation

personal attachments

powerlessness

suggestibility, increasing

undermining beliefs

tech support, pretexting

Teensy HID attack vector

telelphone use

telephone-based tools

Asterisk

Caller ID spoofing

scripts

SpoofApp

SpoofCard

Telephone Records and Privacy Protection Act of 2006

tense switches

tension wrenches for lock picking

The Art of Deception (Mitnick)

The Expression of the Emotions in Man and Animals (Darwin)

The Real Hustle

theft, employee theft

theme development

Theme Park Scandal

Thriving Office

tip jar salting

Tomkins, Silvan

tools

GPS Tracker

online

Maltego

SET (Social Engineer Toolkit)

password profilers

physical

cameras

lock picks

recording devices

practice

pretexting

telephone-based

Asterisk

Caller ID spoofing

scripts

SpoofApp

SpoofCard

Top Secret 1 case study

Top Secret 2 case study

torture, framing and

Tostitos logo

touching objects by kinesthetic thinkers

touching self

transactional model of communications, Balmund, D.C.

trash

dumpster diving pointers

shredded documents

valuable things

Tupperware parties

Turtles All the Way Down (DeLozier and Grinder)

TV reality shows, framing and

U

Ultimate Voice, NLP and

uncertainty, social proof and

undermining beliefs

Unmasking the Face (Ekman)

updating software

USB drive acceptance, communication and

user sites

V

valuable things thrown away

value of information

verb tense

verbal communication

visual framing

visual thinkers

sub-modalities

vocal tone matching

voice

interrogation and

NLP and

Vontu, confidential data in email

W

warm leads

Weaver, Warren. See also Shannon-Weaver model

web attack vector, SET (Social Engineer Toolkit)

websites

background checkers

ICanStalkU.com

information collection

lock picking

microsoft.com, PDF files

personal websites

public reports

public servers

search engines

social-engineer.org

social media

user sites

wedging the alibi approach to interrogation

Westbury, Chris

white color association

Whois

Winston, Joel

Withgott, Margaret

Wizards Project

Wong, Kelvie

words, interrogation

Return Main Page Previous Page Next Page

®Online Book Reader