A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hacking the Human: Social Engineering Basics - Dave Comstock (sten0) BSides Philadelphia 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Hacking the Human: Social Engineering Basics
Dave Comstock (sten0)
@sten0_SE
BSides Philadelphia 2016

Divided into 8 segments covering the core fundamentals of Social Engineering. Starts with "the golden rule of SE" aka abusing self-interest and moves on to wearing masks/selling fake identities and the associate dangers, story telling to build characters and improve perceived status, Stanislavski's “method acting”, OSINT via people watching, abusing the information age, perception training, using mutual vulnerability to foster closeness, and concludes with exploiting our natural processes for learning and decision making via Col. Boyd's OODA loop and Klein/Kahnemans NDM vs Heuristics and Biases.

Sys/Net admin, infosec noob/junkie, locksport enthusiast, and social engineering for funsies. Tech junkie since the days of ribbon cables, anti-static wrist guards, and running games like Tetris and Qbert from the DOS prompt. Social Engineer since before I knew the proper term with my favorite pastime being playing "games" with people to see what I could do or get away with.

Recorded at BSides Philly 2016

Back to BSides Philly video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast