To engender respect and curiosity for networking and security, to educate ourselves and others on safely navigating the landscape of IT, and to strive for and promote careers in Infosec.
This video covers the process of creating a social engineering script. The "big picture" view shows how to create a social engineering script from what to do, figuring out the goal, and contacting the target to perform the attack goal as a whole process. Next, the "single call" view illustrates a general framework of talking to individuals. The results of the individual social engineering attacks can include but is not limited to such items as contact information and internal information. Several videos of sample social engineering attacks are shown. If you wish to further develop skills related to this topic three books that are recommended: “ How to Win Friends and Influence People ”, “ Thinking Fast and Slow ”, and “ The Art of Deception. ” This video was produced for academic purposes for identifying social engineering. This is not an endorsement of any illegal activity. The purpose is to improve cyber security practices and to educate other...
This video covers several useful theories and principles used in social engineering. Think of it as building blocks that can be used. Quite a bit of this comes from scholarly work in psychology. It contains brief overviews of specific topics, definitely look into it more for a better understanding. This video was produced for academic purposes for identifying Social Engineering practices. This is not an endorsement of any illegal activity. I think the part from 8:22 on is the most informative since it comes from a research paper I found specifically about social engineering attacks. The video covers: +Mere Exposure Effect (0:47) +Theory of Planned Behavior (4:04) +Modes of Communication Styles (meh) +Anatomy of Social Engineering Attacks (8:22) *Principles of Persuasion (Authority, Reciprocity, Conformity, Commitment, Scarcity) (9:04) *Frequency of Persuasion Principles used (16:23) *Number of steps used before compliance (1...
Comments
Post a Comment