| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
Divided into 8 segments covering the core fundamentals of Social Engineering. Starts with "the golden rule of SE" aka abusing self-interest and moves on to wearing masks/selling fake identities and the associate dangers, story telling to build characters and improve perceived status, Stanislavski's “method acting”, OSINT via people watching, abusing the information age, perception training, using mutual vulnerability to foster closeness, and concludes with exploiting our natural processes for learning and decision making via Col. Boyd's OODA loop and Klein/Kahnemans NDM vs Heuristics and Biases.
Sys/Net admin, infosec noob/junkie, locksport enthusiast, and social engineering for funsies.
Tech junkie since the days of ribbon cables, anti-static wrist guards, and running games like Tetris and Qbert from the DOS prompt.
Social Engineer since before I knew the proper term with my favorite pastime being playing "games" with people to see what I could do or get away with.
Recorded at BSides Philly 2016
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast