home local_library info account_circle

Human Hacking

If you know the enemy and know yourself you need not fear the results of a hundred battles

-Sun Tzu

Once asked this question to a group of security enthusiasts and I was shocked at the answers I received:
“Social engineering is lying to people to get information.”
“Social engineering is being a good actor.”
“Social engineering is knowing howto get stuff for free.”
Wikipedia defines it as “the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.”

Information technology has changed over the years, but there’s one thing that remained constant. It’s social engineering. Social engineering has a lot of definitions. Some people call it the art of human hacking, while others call it digital attack techniques. Well, both of the definitions are correct. Social engineering is the manipulation of a human being through different mediums. It can be both online and offline. It all depends on how the attack is executed and how convincing the lie is. Furthermore, social engineering is the most popular attack vector. There are social engineering toolkits available on the Internet. These toolkits can easily help a beginner to begin executing social engineering attacks.

The Different Types of Social Engineering

social engineering can take on many forms. It can be malicious and it can be friendly, it can build up and it can tear down. Before moving on to the core of this book, take a brief look at the different forms of social engineers and a veryshort description of each: