Social Engineering
Social Engineering
Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples.
Social Engineering Tactics
📌 Categories of Social Engineering
Psychological Manipulation 🧠
Building Trust & Rapport 🤝
Elicitation Techniques 🎯
Impersonation & Pretexting 🎭
Persuasion Tactics 🏆
Digital Social Engineering 🌐
Physical Social Engineering 🏢
Advanced Social Engineering 🚨
🧠 Psychological Manipulation Tactics
Reciprocity Pressure – "Here’s a free sample, now could you buy something?"
Authority Influence – "The CEO asked me to collect this data from you."
Social Proof Manipulation – "Everyone else has done it—why not you?"
Scarcity Effect – "Only 2 spots left! Hurry!"
Commitment & Consistency – "You signed up for a free trial, why not the full plan?"
Urgency Triggers – "Act now before it’s too late!"
Fear-Based Persuasion – "If you don’t update now, you’ll lose your account."
Guilt-Inducing Requests – "I helped you before, can’t you return the favor?"
Exploiting Sympathy – "I lost my wallet, can you lend me money?"
False Sense of Obligation – "You’re my best friend; I know you’ll help me out."
🤝 Building Trust & Rapport
Mirroring & Matching – Copying someone’s gestures to seem relatable.
Compliment-Based Influence – "You’re amazing at this! Can you help me?"
Artificial Common Interests – "Oh, you love photography too? So do I!"
Using Humor to Disarm – Joking before making a request.
Strategic Name-Dropping – "John said you’re the best person to ask."
Fake Shared Experiences – "I remember you from that event last year!"
Using Authority Figures – "Your boss recommended I reach out."
Selective Vulnerability – "I’m new here, could you guide me?"
Forced Familiarity – Acting as if you already know someone.
Using Social Media Info – "I loved your recent post on LinkedIn!"
🎯 Elicitation Techniques
Open-Ended Questioning – "How do you handle password resets?"
False Confession Baiting – "I already know, but I need confirmation."
Strategic Pauses – Staying silent to make the other person talk.
Flattery for Disclosure – "You know so much about this, tell me more!"
Fake Confidentiality – "Just between us, how does your system work?"
Reverse Psychology – "You probably don’t have access to this, right?"
Implying False Info – "Your office is on the 3rd floor, right?"
Playing Dumb – "I don’t understand, can you explain in detail?"
Fake Surveys for Data – "Take our quick security survey for a reward!"
Gossiping to Extract Info – "I heard something about a new project… do you know anything?"
🎭 Impersonation & Pretexting
Posing as IT Support – "We need your login details to fix an issue."
Pretending to Be Lost – "Hey, do you work here? Can you show me around?"
Impersonating an Authority – "I’m from corporate security; I need access."
Calling as a “New Employee” – "Hey, I’m new. What’s the WiFi password?"
Acting as a Delivery Person – "I have a package for the manager—can I drop it off inside?"
Fake Job Offers – "We’d like to hire you; just send us your ID and bank details."
Acting as a Journalist – "I’m writing an article—can you share internal details?"
Fake Emergency Situations – "Your account is compromised! Confirm details now."
Pretending to Be an Old Friend – "Hey, remember me from high school?"
Fake Customer Complaints – "I need my order details; can you verify my account info?"
🌐 Digital Social Engineering
Fake Phishing Emails – "Your password is expiring, reset now!"
Social Media Manipulation – Pretending to be someone else online.
Fake Online Contests – "Win a prize! Enter your details."
Creating False LinkedIn Job Offers – "We have an open position; send us your CV."
Fake Friend Requests – Adding someone to gain personal details.
🏢 Physical Social Engineering
Tailgating into Secure Locations – Following someone through a door.
Dumpster Diving for Data – Looking through trash for useful info.
Shoulder Surfing for Passwords – Watching someone type their password.
Posing as Maintenance Staff – "I need to fix the WiFi in your office."
Using Fake IDs for Entry – Showing a fake badge to enter.
🚨 Advanced Social Engineering
Fake Police or Government Calls – "This is the IRS. We need your details."
Fake HR Emails – "Update your employee records here."
Fake LinkedIn Recruiter Messages – "We have a job opening for you!"
Fake Bank Calls – "We detected suspicious activity—verify your info."
Fake Social Media Giveaways – "You’ve won! Enter your details here."
🛡️ How to Defend Against Social Engineering
Always verify identities before sharing information.
Be skeptical of urgent or emotionally charged requests.
Use multi-factor authentication (MFA) to protect accounts.
Limit social media sharing of personal details.
Train employees & teams on security awareness.
Last updated