Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
206 views12 pages

Social Engineering

Social

Uploaded by

pepecarpo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views12 pages

Social Engineering

Social

Uploaded by

pepecarpo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

What is Social Engineering?

- Security Through Education

1 de 12

http://www.social-engineer.org/about/

LOOKING FOR SOMETHING?

Search this website

ENTER YOUR TOPIC SEARCH TERMS ABOVE AND WE WILL HELP YOU FIND IT
HOME
NEWSLETTER

BLOG
RESOURCES

FRAMEWORK
CTF

PODCAST

CONTACT

BECOME A
NEWSLETTER
SUBSCRIBER
Your email address
SIGN

UP

NEED S.E. TRAINING?

16/12/2014 10:31

What is Social Engineering? - Security Through Education

2 de 12

http://www.social-engineer.org/about/

UPCOMING EVENTS

Tweet

Share
Share

18

Me gusta

StumbleUpon
FOLLOW
USWhat
HERE

Is Social Engineering?

Social Engineering (SE) is a blend of science, psychology


and art. While it is amazing
and complex, it is also very simple.

WHATS GOING ON
Ep. 064 The Official
John Mcafee Social
Engineer
Post-Cyber Monday

We define it as, Any act that influences a person to take

survival

an action that may or may not be in their best interest.

Danger: Dopamine

We have defined it in very broad and general terms

Addiction

because we feel that social engineering is not always


negative, but encompasses how we communicate with
our parent, therapists, children, spouses and others.
Since SE is not always negative it merits a closer look at

NEED A SPEAKER FOR


YOUR EVENT?

how it is used both for the good and the bad. Our
research shows that the exact same principles that are
used to get a raise or communicate with your spouse or
children are often used by malicious scammers and social
engineers to part you and your company from data,
information, money and more.
Just a few years ago, we decided to start writing a course
on social engineering and how it is used by penetration
testers and security enthusiasts. That process gave birth

LOOKING FOR A GOOD


16/12/2014 10:31

What is Social Engineering? - Security Through Education

3 de 12

to the Social-Engineering Framework. That framework

http://www.social-engineer.org/about/

BOOK?

became the centerpiece for this website and branched off


into the podcast, newsletter, two books and now a
company that helps corporations learn how to combat
and mitigate the effects of malicious social engineering.
To accomplish this task, we have built a team of

FIND POSTS BY TOPIC


Select Category

professional social engineers, psychologists, researchers,


scientists and security enthusiasts. We have then worked
with, interviewed and learned from some of the greatest
and brightest scientific minds in the world to bring you a
resource that will dive deep into the art, science and
psychology of the Human Operating System

FOLLOW
US HERE

FIND POSTS BY
MONTH
Select Month

OUR VALUED
SPONSORS

Chris
"loganWHD"
Hadnagy
Chief Human Hacker,
Social-Engineer, Inc
and lead developer,
author and
professional social
engineer.

DEF CON SPONSORS

FOLLOW: @humanhacker /
[email protected]

Michele Fincher
16/12/2014 10:31

What is Social Engineering? - Security Through Education

4 de 12

http://www.social-engineer.org/about/

Chief Influencing
Agent, Social-Engineer,
Inc., former US Air
Force Academy
professor, field-trained
counselor and serious
kicker of all butts.

FOLLOW
US HERE

FOLLOW: @SocEngineerInc /

DEF CON 22

[email protected]

#SECTF4KIDS SPONSOR

Amanda
"ORGINAGGER"
White
Official nagger to the
human hacker. Lover of
color coded lists and
organization. I have
never lost a shirt in my
life.
FOLLOW: @thatassistant86 /
[email protected]

Mike Hadnagy
Supporting a group of

16/12/2014 10:31

What is Social Engineering? - Security Through Education

5 de 12

http://www.social-engineer.org/about/

social engineers is not


easy, and that is why
Mike has the job.
Dedicated, supportive
and always smiling.
FOLLOW: @MikeHadnagy /
[email protected]

David Kennedy
FOLLOW
US HERE

President and CEO of


Trusted Sec, developer
of The Social-Engineer
Toolkit, professional
pentester, and comedic
relief for the podcast.
FOLLOW: @HackingDave /
[email protected]

Ping Look
Ripper of hearts and
destroyer of souls.
Enough said.
FOLLOW: @vlkyri

16/12/2014 10:31

What is Social Engineering? - Security Through Education

6 de 12

http://www.social-engineer.org/about/

Jordan
Harbinger
Owner of The Art of
Charm, NYC Lawyer,
kidnap victim and life
hacker.
FOLLOW: @TheArtofCharm

FOLLOW
US HERE

Tamara
Kaufman
Grad student working
on masters in
Psychology, technical
writer in InfoSec,
actually paid to click
links.
FOLLOW: [email protected]

Daniel Falk
Daniel Falk is a
network analyst that

16/12/2014 10:31

What is Social Engineering? - Security Through Education

7 de 12

http://www.social-engineer.org/about/

designs and
implements
infrastructures for
mid-large size
organizations. He
enjoys being
challenged and is
pursuing his graduate
program in information
assurance. And he is
the lord of all servers
and master of the
server-verse for the
FOLLOW
US HERE

Social-Engineer Team.
FOLLOW: @dnfalk

Nick Hitchcock
Nick likes performing
large-scale security
assessments/penetration
tests, risk assessments,
forensic analysis,
physical security
assessments, and social
engineering
engagements. So
basically, breaking
stuff and make admins
cry.
16/12/2014 10:31

What is Social Engineering? - Security Through Education

8 de 12

http://www.social-engineer.org/about/

FOLLOW: @nick8ch /
[email protected]

Jim Manley
Old gray guy who does
designs, builds and
secures complex IT
infrastructures, collects
and drinks whiskey,
FOLLOW
US HERE

rides a bicycle, shoots


guns and makes lists.
Not necessarily in that
order. Lives by the
motto "What doesn't
kill you makes a damn
good story!"
FOLLOW: @jw_manley

Mister_X
Thomas d'Otreppe
Mister X is a wifi
hacker and the author
of Aircrack-ng, a Wi-Fi
auditing suite. He has
designed Offensive-

16/12/2014 10:31

What is Social Engineering? - Security Through Education

9 de 12

http://www.social-engineer.org/about/

Security WiFu, a
proactive wireless
security course, with
Mati Aharoni and also
contributed to
BackTrack Linux. He
works as a software
developer for Main
Nerve.
FOLLOW: @aircrackng

FOLLOW
US HERE

Jessica Clark
Jr. Social Engineer
learning the craft and
hacking the human OS.
Expert in marketing,
elicitation and making
people smile. You can
meet her before or
after she steals your
wallet.
FOLLOW: @cyberdahl /
[email protected]

Evan Davison
16/12/2014 10:31

What is Social Engineering? - Security Through Education

10 de 12

http://www.social-engineer.org/about/

Often dabbling in RF,


sarcasm,
satellite/terrestrial
communication, and
critical infrastructure
destruction, he is in his
element behind digital
radio equipment,
satellite and digital
audio encoders, and
generally anything that
makes LOUD NOISES.
FOLLOW
US HERE

FOLLOW: @pentestfail /
[email protected]

16/12/2014 10:31

What is Social Engineering? - Security Through Education

11 de 12

http://www.social-engineer.org/about/

Colin Hadnagy
A junior social
engineer that loves to
break stuff. He spends
way too much time
with Google and
Maltego, and has an
inordinate love for
imugr.

FOLLOW
US HERE

FOLLOW: @UnmaskedSE /
[email protected]

LOOKING FOR
SOMETHING?
Search this website

HELPFUL
LINKS
ABOUT
BLOG
FRAMEWORK

BECOME A
NEWSLETTER
SUBSCRIBER

PODCAST
NEWSLETTER
RESOURCES
CTF
THE

Your email address


SIGN UP

SEVILLAGE
CONTACT

16/12/2014 10:31

What is Social Engineering? - Security Through Education

12 de 12

http://www.social-engineer.org/about/

BACK TO TOP
COPYRIGHT 2014 SOCIAL ENGINEER, INC ALL RIGHTS RESERVED SITE DESIGN BY EMILY WHITE DESIGNS

FOLLOW
US HERE

16/12/2014 10:31

You might also like