Prompts

R3zk0n · October 2, 2025

Contents

    Psychology

    • Image of person
    • Impersonation, provides sense of urgency, appeal to authority for legitimacy, reciprocity
    • Exploitation of trust, authority, and social norms
    • Fear
    • Scarcity (“limited time offer”) can create a sense of urgency.

      Examples

    • Web - Install malware, steal credentials, phishing, email
    • Phone - vishing/smishing, credit card, bank details, buying gift cards
    • Scams - Cryptocurrency - snafuu, safemoon,
    • More scams - Nigerian prince, British royalty
    • Social media - Impersonation, trust-based attacks
    • Myanmar - capturing chinese citizens, Myawaddy
    • Physical security - Tailgating, Dumpster diving, Piggybacking, Badge cloning, Impersonation of service personnel
    • Historical - Trojan Horse, Cold War spies double cross, Honeypots in modern day, Propaganda war machine
    • Heists - Japanese police impersonation (bank heist)
    • Movies - glamorize with high stakes, focus on the “big score”, real attacks are silent and incremental
    • Television - selling fake products
    • People around you - invitation to pyramid scheme, bank detail stolen coles groceries

      Countermeasures Against Social Engineering

    • Training and awareness programs
    • Multi-factor authentication
    • Patched software to minimize technical vulnerabilities
    • “Zero Trust” security policies
    • Simulation

      Why Social Engineering is More Dangerous Than Hacking

    • Weakest link - Human vulnerabilities are harder to patch than software
    • Social engineering provides the key to bypass technical security measures
    • Multi-layered consequences including financial, data, and reputation loss

      Social Engineering Tools

    • Social Engineering Toolkit (SET), Evilginx for cloning websites
    • Maltego - OSINT investigation tool, find relationships
    • WiFi Phishing Tool for Seek Hive Week - obtain credentials for further exploitation

    Twitter, Facebook