Social Engineering First Hand

  • Tutorial
Kevin Mitnik, the founder of social engineering, has the golden words:
The social engineer decided to get the project (sources) of your new product 2 months before the release.
What will stop him?
Your firewall? Not.
Powerful identification system? Not.
Intrusion detection system? Not.
Data encryption? Not.
Restrict access to dial-up numbers of modems? Not.
Coded server names that make it difficult to locate the project of the product you are looking for? Not.
The point here is that no technology in the world can withstand the attack of a social engineer.



However, you can still partially protect yourself - by studying how we move a social engineer, how he thinks and acts, what methods he uses. Knowing this, you can protect yourself from the attacks of social engineers. You can read more about this in the book about the art of deception by Kevin Mitnick. However, since few people like to read books, you can watch the movie Hack, where the tricks used by Kevin are well illustrated. Below are key videos from this movie. They can be used quite well when conducting corporate trainings on information security.

00: Where does the CA begin (Part 1)
01: Blind intelligence (vishing, part 1)
02: Flattering Engineering (Wishing, Part 2)
03: Makeshift Masquerade
04: Jokes are bad with a social engineer
05: What CA begins with (part 2)
06: And there is a slammer on the old woman
07: Hack Rematch - Don't Offend SA
08: Predator and prey change roles
09: Physical penetration
10: Three in one - phishing, phishing, masquerade

Only registered users can participate in the survey. Please come in.

What type of social engineering is most popular?

  • 74.2% phishing 98
  • 8.3% vishing 11
  • 13.6% masquerade 18
  • 3.7% other (in comments) 5

Also popular now: