We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).
This week, we're at it again for one last social engineering meetup.
Common Goals of Social Engineering Calls
- Scoring needy people free food
- Manipulating and extending warranties
- Contracting and haggling cheap services (just for practice)
- Tricking businesses into revealing personal information about customers
- Leading retail companies on for a sale to try to reduce prices as low as possible
I hope that these calls will serve as a first-hand guide for everyone to learn more about social engineering. This will serve as a very rare link from the small underground world of the "Fone Phreaks" to you, in hopes of teaching you how a professional social engineer manipulates the human mind to their advantage with ease. This includes what fake names statistically work best, which scenarios, accents the manipulator uses and more.
- Skype account
- IRC client
This coming Monday night, you can join the IRC channel for an invite to a Skype room filled with professional social engineers! If you're new to IRC, go here to learn how to set it up and use it. If you attend IRC and show interest, you will receive an invite to the chat and conference.
Monday starting at 5 p.m. PST (8 p.m. EST). If you need to convert the time to another time zone, just go to the Time Zone Converter. This will be our last social engineering group phone session, so make sure you're there. You won't want to miss it!
PLEASE, arrive on time. You will be left out if you do not arrive on time.
I hope for this to teach you all about the threats and uses of social engineering in the real world. Upon finishing each call, we can post them to YouTube so the rest of the community can hear the devious tactics that went down.
You are free to try a call if you think you are up to it. You will see some really intense stuff and it's not for the faint of heart. Be prepared to hear businesses you interact with often gleefully handing out your personal information on a whim to a person without identity.
Feel free to sign up for calls below.
Be a Part of Null Byte!
Start your White-Hat Hacker journey with Null Byte's Beginner's Guide to Mastering Linux eBook.