Professional Documents
Culture Documents
1.What Is 'SEing?'
2.The Definition Of 'SEd'
3.'SEs' Defined
4.The Meaning Of 'SE'er'
5.What Does 'SE' Mean?
6.Definition Of Se'able
7.The 'DNA' Defined
8.What Is DNA'd?
9.The Definition Of 'Wrong Item Received'
10.The 'Missing Item' Method
11.The 'Boxing' Method
12.The 'Double Dip' Method
13.The 'Triple Drip' Method
14.A 'Drop House'
15.The Definition Of 'POP'
16.What Does 'AR' Stand For?
17.'POD' Defined
18.What Is An 'RMA?'
19.The Meaning Of 'C&D'
20.The Abbreviation Of 'SN'
21.'Tracking Number'
22.'Corrupted File'
23.Definition Of 'Reship'
24.'Receipt Generator'
25.'Investigation'
26.'Police Report'
27.The 'Blood Method'
28.'Cross Shipping'
29.What Does 'VCC' Mean?
30.The 'Faulty Item Disposed' Method
31.The 'Gift Method'
32.'Similar Item' Method
33.'Human Hacking'
34.'Human Firewall'
35.'Image Metadata'
36.The 'MM' Service
37.'FTID' Method
38.The 'EB' Method
39.The 'Sealed Box' Method
40.'The Faulty Item Method' Defined
41.The Meaning Of 'TID'
42.The Abbreviation Of 'LIT'
43.The Definition Of DNA'ing
44.The 'Indirect SEing Method'
45.What Is A 'Service Tag?'
46.The Meaning Of 'PEB'
47.The Definition Of 'CSR'
48.What Are 'Refunders?'
49.A 'Statutory Declaration'
50.An 'Affidavit'
51.A 'PayPal Dispute'
52.A 'PayPal Claim'
53.Perform a 'Chargeback'
54.'Section 75' Claim
55.What Is DNA'able?
56.'DNA It' Defined
57.An 'Advanced Exchange'
58.What Does 'DOA' Mean?
59.What Does 'MEB' Stand For? - New
60.What Is A 'CRN?'
61.The 'Missing Item Tampered Method'
62.The 'Manufacturer Missing Item Method'
63.The Long Form Of 'CC'
64.The Abbreviation of 'WIR'
65.The 'Corrupted Video Method'
66.PayPal 'INR'
67.What Is An 'AWB?'
68.PayPal 'SNAD'
69.The 'Partial Method'
70.A 'Bank Reversal'
What Is 'SEing?'
This Is one of the most commonly used terms In the world of social engineering, which means exactly this-
"Social Engineering". You will find that every Internet forum and chat gateway where social engineering Is
discussed, will utilize "SEing" quite often. It's sometimes used with an apostrophe as "SE'ing".
Examples
As with the above, this Is also used with an apostrophe as "SE'd", but obviously they both denote the same
thing which Is "Social Engineered". Those who've been In the SEing scene for a long time, will always use
"SEd". I for one, cannot remember the last time I used social engineered anywhere online.
Examples
* I SEd Amazon over 20 times on the same account.
* Someone called and I think he SEd my password.
* There's no way he SEd that Item using the Partial method.
'SEs' Defined
To the contrary of both the above, "SEs" Is not too often used In social engineering communities, but
nonetheless, It's certainly worthy of familiarizing yourself with Its meaning which Is "Social Engineerings".
This Is always used as the abbreviation- due to Its long form not making much sense at all.
Examples
Used to describe the person who social engineers, hence "SE'er" short for "Social Engineerer". It's
abbreviated and used as such, mainly because social engineerer Is not In the English vocabulary and (as
with "SEs" above) when used as a whole word, It doesn't make any sense. This Is predominantly used with
an apostrophe and seldom without.
Examples
Without question, this Is the most frequently used term In the art of human hacking. Even If you've just
started reading guides etc, you would've definitely experienced the abbreviation of "SE" which Is "Social
Engineering" and depending on the context of the sentence, "Social Engineer". This can be used In many
ways, but obviously I cannot demonstrate the lot.
Examples
Definition Of Se'able
This Is one term that you won't come across often no matter where you're conversation Is taking place, but
nevertheless, It's still Important to understand Its abbreviation. "Se'able" Is short for "Social Engineerable",
which as you can see, the latter Is not a part of the English vocabulary, so It's always used as "se'able". It
just means that an given entity scan be social engineered.
Examples
This Is equally used In Its abbreviated and long form. Put simply, "DNA" stands for "Did Not Arrive" which
(as Its name Implies), the social engineer claims that the Item/package he ordered from an online retailer,
did not arrive at his premises. I personally like using "DNA"- It's quicker and easy to relate to, but that's just
me.
Examples
What Is DNA'd?
As with the above, namely DNA, this has the very same meaning, but used In past tense rather than In Its
present form. If you haven't worked It out already, "DNA'd" Is "Did Not Arrived". Clearly, you can see why
It's abbreviated- "Did Not Arrived" Is not grammatically correct, thus It will never be used as such In the
social engineering community.
Examples
A very effective method used by social engineers when SEing a company to obtain a refund or
replacement, Is the "Wrong Item Received" method. In short, the SE'er will claim that the company sent an
Incorrect Item and when asked to return It, they'll process a refund/replacement. There Is no abbreviation
for this- It's always used as written: "wrong Item received".
Examples
As with the above method, this Is always used In Its long form being: "missing Item" method and never
abbreviated. As Its name suggests, social engineers use It when claiming that the Item they've ordered
from an online company, was missing when the package was delivered and opened. This method Is very
common In the SEing scene.
Examples
No matter where you navigate In the social engineering sector, you will come across the "boxing" method,
which Is mainly written as "Box" It Involves sending a box back to the company without the Item, and
tearing the package as though the Item was stolen before It reached them. The SE'er then gets a refund or
replacement.
Examples
This Is not used too often at all, namely due to the complexity of what the SE Involves by using the "double
dip" method. Without going Into too much detail, It's simply social engineering the same company twice In
row- with the Intention of getting two Items free of charge. The term Is used as "double dipping" and
sometimes "double dip".
Examples
This works In a similar fashion as the double dip method, except Instead of social engineering the same
company twice, It's done three times thereby receiving 3 Items absolutely free. Whenever you read about
this method, It will be written as "triple dipping" or "triple dip". Sometimes It's also used as "triple dipped".
Examples
A 'Drop House'
The "Drop House", Is a house that does not belong to the social engineer and Is used as a delivery point to
receive packages. There are many reasons to use this, with the most common being to protect the SE'rs
Identity, and/or to avoid being billed by the company who's sending the goods. This Is also used as "Drop
Address" or simply "Drop".
Examples
When a social engineer SEs an Item and requests for a refund or replacement, before the company Issues
It, they may ask for a "POP" which Is short for "Proof Of Purchase", just to verify that the Item was
purchased from their store. I'd say both Its abbreviation and long form are equally used, but I personally
prefer "POP".
Examples
If you've never come across "AR", you'd be at a complete loss as to what It's referring to. It's an
abbreviation of "Advanced Replacement". Not too many companies offer this as part of their claims
process, but for those that do, It means that they will send the Item BEFORE the defective product Is
returned to them, hence "Advanced Replacement".
Examples
'POD' Defined
"POD" which Is short for "Proof Of Destruction", Is not too commonly used. When SEing a company, prior
to them sending a replacement for a defective Item, the representative will ask the SE'er to destroy the
defective Item/device by (for example) breaking the buttons and cutting the cord on the computer mouse,
or drilling holes In the Hard Disk Drive, thus "Proof Of Destruction".
Examples
What Is An 'RMA?'
Short for "Return Merchandise Authorization", an "RMA" Is Issued by a company to approve a refund or
replacement of an Item. It's very rare that social engineers will refer to this by It's extended name, but
rather abbreviate Its usage as "RMA". Nonetheless, be sure to familiarize yourself with each term.
Examples
Now this Is one term that you'll rarely come across, when communicating on forums or Discord. "C&D"
stands for "Cease And Desist", which Is a letter Issued by a company to the SE'er asking him to stop his
SEing activity. The company Is obviously aware of the SE'ers actions and If he doesn't stop, they'll start
legal proceedings.
Examples
This Is very much common knowledge for advanced SE'ers, but when It's used and written as "SN", It
makes very little to no sense to novice social engineers. Going by personal experience, I'd say that It's
equally used as "SN" and "Serial Number". It's also used simply as "Serial", but not as often as the others.
Examples
'Tracking Number'
When a product has been purchased and shipped to the delivery address, a "Tracking Number" Is
assigned to the package. It's usually sent In a confirmation email after the Item has been ordered. It allows
the customer to track and see the location of their package at any point In time, by entering It Into the
website's tracking option of It's respective carrier. This Is never abbreviated.
Examples
'Corrupted File'
The "Corrupted File" Is a method used by SE'ers, when companies ask them to provide a picture or video
that must Include the Item and other Identifiable details. Once they receive It, a refund Is Issued. However
SE'ers don't have the Item to begin with, so they send a "Corrupted File", and assure the company that It's
working fine on their end. The SE'er will keep repeating the process until the company finally gives up and
provides a refund.
Examples
Definition Of 'Reship'
Some SE'ers use what's called a "Reship" (or "Reshipping") company rather than their own address. Once
the package has been sent by the online store, It's delivered to the reship company's warehouse and they'll
forward It to the SE'ers house. This Is a good way to keep your real address hidden from the online store.
Examples
'Receipt Generator'
Many social engineers go to great lengths to succeed with whom they're SEing and If It means falsifying
paperwork to achieve their objective, they will do just that to the company who's requesting It. Such
paperwork, Is to create a fake receipt using a "Receipt Generator". This term Is always used as written.
Examples
'Investigation'
Every online supplier, differs to some degree In the way they address and process refund and replacement
claims, but a very common approach with the majority of retailers, Is to open what's called an
"Investigation". This Is used to check whether there's any Inconsistencies with what the social engineer has
provided to the company.
Examples
'Police Report'
Further to the above pertaining to a company opening an Investigation, the company could also ask the
SE'er to obtain a "Police Report" to help with their Inquiry. Amongst other reasons, the police report Is often
requested when the SE'er uses the DNA (Did Not Arrive) or the missing Item method.
Examples
Social engineers use a very clever method to avoid sending an Item back to the company, namely the
"blood method". Health & safety Is taken very seriously by companies on every scale, hence the majority
refuse to accept goods that contains blood. When formulated correctly, this Is very effective Indeed.
Examples.
'Cross Shipping'
There are many options used by companies when dispatching customer orders and receiving warranty
claims, and one of these options Is called "Cross Shipping". There are a few steps Involved but for the
simplicity of this article, It's when a company ships a package containing the replacement Item at the same
time the customer (SE'er) sends their package containing the defective Item.
Examples
A "VCC" Is an abbreviation of "Virtual Credit Card". Unlike your physical (plastic) credit card, It's simply a
number that's associated with your real card. Think of It as a disposable card- If anything happens to It, just
get a new one. Generally, It can only be used once and cannot be traced to the real card. SE'ers use this to
anonymize their real credit card when SEing a company.
Examples
When SEing an Item that has (seemingly) lost functionality, the representative will go through a few
troubleshooting steps and then ask the SE'er to return the Item for a refund or replacement. Rather than
returning It, the social engineer will use the "Faulty Item Disposed" method, by saying that he threw It out
due to health & safety concerns.
Examples
When SEing a company for a particular Item that you don't have to begin with, before they can approve the
claim, they'll sometimes ask for the POP (Proof Of Purchase). Obviously you don't have It, so to circumvent
the rep's request, you'd use the "Gift Method" by saying you've received the Item as a gift from a friend.
Examples
Manufacturers/suppliers can make errors when picking and packing products prior to dispatch- particularly
when two or more Items are very similar In appearance. Social engineers are well aware of this, and use
the "Similar Item Method", by sending back an old Item that looks very similar to the original. As such, the
rep will assume It's the ordered Item and process a refund.
Examples
'Human Hacking'
I'm sure you know by now that social engineering Is a form of hacking, but as opposed to traditional
hackers using technical means to compromise a particular website or computer, SEing Is achieved by
manipulating the person In question. As a result, It's the human that's exploited, and not the device. So the
terms "Human Hacking" and "Social Engineering" are Interchangeable.
Examples
'Human Firewall'
Not only do devices such as computers and networks have firewalls to keep the bad guys out, you may not
realize It, but you too have what's called the "Human Firewall" on a personal level. For Instance, If
someone tries to SE you over the phone, with the Intention to have you read out your password, your
"Human Firewall" kicks In and you make the decision to keep It to yourself.
Examples
When a company asks for a POP (Proof Of Purchase) from the social engineer and he doesn't have It, he'll
Photoshop It and send It In the form of an Image file. However, the rep can see It's been edited, by viewing
the "Image Metadata". The SE'er Is always one step ahead- he'll simply change the "Image Metadata"
accordingly.
Examples
The "MM" service Is an abbreviation of "Middle Man" service, and Is often used In forums/boards for
purchases made within the confines of the same community. The "MM" Is a trusted user who acts for the
buyer and the seller, by holding the funds and ensuring the buyer gets the product, and the seller gets his
money.
Examples
'FTID' Method
At the time of this article, this Is a relatively new method that contains a lot of flaws and Inconsistencies.
"FTID" Is short for "Fake Tracking ID", but Is almost always used as "FTID". In very brief terms, you send
an envelope with the tracking number, and make It look like It's an ad. The company will receive It and
throw It out (because It's an ad) and Issue a refund.
Examples
Although this Is not so much of commonality In social engineering parlance, It's still worth taking note of Its
meaning and usage. "EB" Is an abbreviation of "Empty Box", which Is no different to the "missing Item
method" already mentioned mid-way through this guide.
Examples
* 50 grams Is fine for the EB method.
* Is an Investigation opened when using the EB method?
* I used the EB method successfully for the SSD.
This Is always used as written, namely "Sealed Box Method" without any abbreviation. The method Itself, Is
not used as often as (for example) the DNA, but very effective when formulated correctly. The objective Is
to replace the SEd Item (with an old Item you have lying around the house), In the box without showing any
signs of tampering whatsoever. As a result, the company will think that you've sent the original one back,
and Issue a refund.
Examples
A 'Statutory Declaration'
A "Statutory Declaration", Is a written statement that declares that everything stated Is true and correct. It Is
signed In the presence of an authorized witness such as a police officer or medical practitioner (doctor). A
company may request the SE'er to sign one as part of their Investigation process. This Is also abbreviated
as "Stat Dec".
Examples
An 'Affidavit'
Unlike a Statutory Declaration that must be signed In front of a Justice of the Peace to make It legally
binding, an affidavit Is quite the opposite. Put simply, once an affidavit Is signed, It becomes a legally
binding document and can be used as evidence In court. In terms of SEing, It's used for the purpose of
confirming that the Information you've provided about the actions of your SE, Is In fact true and correct.
Examples
A 'PayPal Dispute'
Not everything goes according to plan with every SE and when a company refuses to refund an Item, the
SE'er will open a "PayPal Dispute", whereby the buyer & seller will try and come to an agreement. If they
can't (which will obviously be the case with the social engineer), then It will be escalated to a claim.
Examples
A 'PayPal Claim'
After the social engineer has opened a PayPal Dispute and failed to reach an agreement with the seller, It
then gets escalated to a "PayPal Claim". This Is when PayPal steps In by reviewing the case, and
ultimately decide the outcome In an Impartial and unbiased manner. PayPal Claims have a 20 day time
frame from when the Dispute was deemed Inconclusive.
Examples
Perform A 'Chargeback'
If the PayPal Claim Is declined by PayPal, the SE'er can still get a refund from his credit card provider by
performing what's called a "Chargeback". If successful, the credit card provider will get the funds from
PayPal's merchant, who will then get the funds from PayPal Itself, and PayPal will grab the cash from the
seller.
Examples
As with PayPal claims/disputes and credit card chargebacks, a "Section 75" claim works In a similar
fashion, but the difference Is that you file a claim against your credit card provider for a refund. However,
the Item or service that you're claiming to refund, must be valued over £100 and not over £30,000. A
Section 75 only covers Individuals and not businesses.
Examples
* What are my chances with a Section 75?
* Your credit card provider must reply to your Section 75.
* If the Section 75 fails, contact the ombudsman.
The "Partial Method", Is based on the same principle as both the 'missing Item method' and the 'empty box
method'. However, rather than SEing an Item on Its own, the SE'er will order a bunch of Items shipped
together, and then claim that one was missing. It must be extremely light that will not register a weight on
consignment, hence the company cannot cross-check the details with the carrier. This method Is also only
written as "Partial".
Examples
A 'Bank Reversal'
When doing a "Bank Reversal", It's no different to a Chargeback via the credit card provider. The process Is
the same, with the only difference being that It's done with your bank Instead of the credit card sector. If the
bank deems the claim In favor of the SE'er, then PayPal has no say In the matter, and must Issue a refund.
Examples
What Is An 'AWB?'
An "AWB" which Is an abbreviation of "Air Waybill", Is rarely spoken of In the SEing community, but
nonetheless, It must be familiarized by all SE'ers. It's simply a receipt Issued by an International carrier
that's used for air freight, to confirm the shipment of goods from the sender to the recipient. It's similar to
how a tracking number operates, but Instead, the AWB Is used for International shipments.
Examples
PayPal 'SNAD'
When SEing a company to refund an Item, some SE'ers prefer to file a dispute through PayPal by using the
"SNAD" (Significantly Not As Described) option. As Its name Implies, It's used to say that the description of
the Item that was ordered, was different to the one that was received. This Is similar to the traditional wrong
Item received method.
Examples
PayPal 'INR'
As with the above example regarding a PayPal dispute, the only other reason you can submit a claim, Is for
an "INR" (Item Not Received). It's pretty self-explanatory, meaning the package that the carrier was
supposed to deliver, was not received. This Is the same as the good old "DNA" method that SE'ers
commonly use when social engineering online stores.
Examples
You may not come across this term too often In any given social engineering community, but nevertheless,
you never know when you may require this type of service- particularly when you cannot do the job
yourself. "Refunders", also referred to as a "Refunder" Is when SE'ers take advantage of an entity, such as
a PayPal dispute/claim or a credit card chargeback, and specialize In reimbursing funds Into the accounts
of those who utilize their services.
Examples
I can confidently say, that this Is one of the least used terms In the world of social engineering. In fact, I've
only stumbled upon It a handful of times In Its abbreviated form, namely "CSR" which stands for "Customer
Service Representative". Its meaning pretty much speaks for Itself- a rep who works for a particular
company and handles the needs of Its customers, such as dealing with returns & replacements, processing
orders & claims and so forth. It's almost always used as "CSR".
Examples
* The CSR said he'll get back to me In 3-5 days.
* I SEd the CSR easily and he gave me a refund.
* What's the name of the CSR you spoke with?
If you're familiar with the partial method or you've just read Its definition a few paragraphs above, then you
can certainly relate to the "PEB" which Is short for "Partial Empty Box". As a matter of fact, It's no different
to the partial method, only worded In another context. At the time of writing, "PEB" Is not used often at all,
but It's becoming somewhat popular with those who are new to the social engineering scene. I assume that
SE'ers have put together "EB" (Empty box) and "Partial" to form "PEB".
Examples
Also referred to as a "serial number", a 'service tag' predominantly relates to laptops that uniquely Identifies
the product for (example) drivers, online support and warranty purposes. Social engineers use It for the
latter (warranty) when SEing Dell, HP etc for refunds or replacements by creating a fake "POP" (Proof Of
Purchase), and also a drop house/ address. For this to work, the service tag must obviously still be under
warranty.
Examples
If you've just come across this method for the very first time on this blog, then I can confidently say that
you've never read about It on any online source- well, not by Its title. That's because I'm the creator of the
'Indirect SEing method' and anyone who claims otherwise, has copied my work. As opposed to every other
method that SEs the Item directly, this Is used to SE an Item that's extremely easy (and guaranteed to
work), get a refund on that, and then purchase the Item you Initially wanted. In short, you SE one Item, get
a refund, and purchase the other one- hence "Indirectly" SEd.
Examples
* If the laptop Is too hard to SE, use the Indirect SEing method.
* I've used the Indirect SEing method to refund the AirPods and buy the SSD.
* The Indirect SEing method Is fine with any Item you like.
The Definition Of DNA'ing
This Is used on the same principle when referencing the "DNA method", but In a different context. It refers
to what the SE'er Is currently doing with the method, or planning to do with the SE at a later time. Seldom
Is "DNA'ing" discussed between members but nonetheless, It's worthy of taking note of Its usage. You will
never come across It without Its abbreviation, and that's because there Isn't one and even If you tried to
expand It, It will not make any sense whatsoever.
Examples
This Is one term that you'll seldom experience In message boards and online chat, but Irrespective of Its
rareness, It's Imperative to have knowledge of everything relative to SEing. "LIT" Is an abbreviation for
"Lost In Transit" and although It can be Interpreted In different ways, It basically means that when the SE'er
(seemingly) returns his Item for a refund/replacement, he'll first create a label with disappearing Ink that will
lose Its color sometime later, leaving a blank label behind. As such, the package will be marked as
delivered, but lost In transit.
Examples
As Its name Implies, the "faulty Item method" Is used when the social engineer purchases an Item that has
some type of functionality, such as an electric toothbrush or hair straightener, and then calls the company
and says that It's not working. The rep/agent will then go through a few routine troubleshooting steps and
when he's satisfied that the Item Is defective, he'll Issue a refund or replacement, but only when the
nonfunctional Item Is returned. The SE'er will easily circumvent the return by using (for example) the box
method.
Examples
Examples
What Is DNA'able?
As you've most likely guessed by Its title, this Is obviously related to the DNA (Did Not Arrive) method, and
Is used to say whether an Item, company or carrier Is In fact compatible with the DNA method Itself. Its
abbreviation of "DNA'able" Is hardly used In major social engineering boards, however as with every SEing
term, It's vital to be familiar with Its meaning and usage. As such, you won't be left clueless when you do
happen to come across It during your travels when reading threads/posts.
Examples
There are so many abbreviations relative to the DNA (Did Not Arrive) method, that It can be somewhat
difficult to keep track of the lot, particularly If you've only recently started your career In the art of company
manipulation and exploitation. It's Important to have sound knowledge of each and every one, Inclusive of
"DNA It" which simply means to go ahead and claim that you didn't receive your package from the carrier
driver.
Examples
When SEing an Item that has some type of functionality to operate and you contact the rep claiming It's not
working, some companies such as Logitech & SteelSeries, will ask you to destroy It rather than returning It
for a refund/replacement. Their requirements are to record a video demonstrating the process of (for
example) cutting the cord, breaking keys/buttons, drilling holes Into the product and so forth. Obviously you
have no Intention to comply with their request, so you'll put the "corrupted video method" Into action by
sending footage that cannot be viewed on their end, thus putting them at fault for their Incapacity to
process your claim accordingly.
Examples
* Change a single character In the URL with the corrupted video method.
* The corrupted video method can be used on any video sharing site.
* Hit the corrupted video method many times until the rep approves the claim.
An 'Advanced Exchange'
If you've read the "AR" (Advanced Replacement) topic In this article, then you'd relate to an "Advanced
Exchange" with Incredible ease. This Is offered by Dell which Is the same as an AR, but worded differently.
Put simply, an advanced exchange means that the company will send you a replacement Item "In advance"
and when you receive It, you're supposed to return your defective unit. Being the SE'er that you are, you'll
do nothing of the sort. To circumvent their request, you can box them or use a drop address to accept the
replacement and disappear thereafter.
Examples
* If you don't return your Item with an advanced exchange, your account will be billed.
* Advanced exchange Is a service exclusive to Dell.
* Make sure your monitor Is under warranty when using an advanced exchange.
Of all the terms and definitions that I've had the pleasure of documenting In this encyclopedia, the "DOA",
which means "Dead On Arrival" Is the least used abbreviation In social engineering parlance. At the time of
writing this post, It's rarely spoken of In active SEing communities but nonetheless, every SE'er must be
familiar with Its meaning- which Is used to say that the Item delivered by the carrier company, had no
functionality, hence "dead on arrival" when It was received.
Examples
* Tell the rep that the monitor Is DOA and get an advanced replacement.
* You can use the faulty Item method when the Item Is DOA.
* Instead of saying the AirPods are DOA, use the missing Item method.
Examples
* When using the WIR method, make sure the Item Is purchased from the same company on a fake
account.
* What do you think Is better for SEing AirPods, the WIR or the missing Item method?
* The WIR method can be used with any company that has an Inventory of stock.
Although the meaning of "CC" Is pretty much stating the absolute obvious, If you haven't come across Its
abbreviation when used In social engineering parlance, you'd be somewhat at a loss as to what It pertains
to, and rightly so - It could be Interpreted In many different ways. As an SE'er yourself, I'd say It's safe to
assume that you own a "Credit Card", which Is precisely what It means and because some forums have
keyword filtering In place to prevent discussions about carding and the like, members Instead use "CC" to
make sure their posts can be generated.
Examples
This Is a variation of the missing Item method, whereby you claim that upon purchasing your product and
opened the box (yes, It must be factory packed In a "box"), there was nothing Inside, meaning only the box
was delivered to you without your Item. Essentially, It was the manufacturer who neglected to pack the
Item, hence only sent the box to the company and you just happened to buy It. These types of errors
happen a lot more often than you may think, which Is what makes the "manufacturer missing Item method"
so effective.
Examples
* The weight limit for the manufacturer missing Item method Is 120 grams.
* Make sure the box Is fully covered In cardboard when using the manufacturer missing Item method.
* It doesn't matter If the warehouse has CCTV with the manufacturer missing Item method - they can't see
what's Inside the box.
If you're familiar with the traditional missing Item method, you'd have no problem relating to the "Missing
Item Tampered Method". You may not recognize It by Its title, for the reason that I'm the author of the
method by naming It as such, and I'm also responsible for Its formulation and execution. Okay, In terms of
Its objective, you'd claim that your Item was missing when you opened the package that was delivered by
the carrier. If the company tries to deny It due to their records showing the Item was enclosed, you'd say
that the package/box was damaged when you received It. This gives the Impression that It was tampered
with, hence your Item was stolen before It reached your address. Because It (apparently) happened In
transit, the company cannot prove otherwise.
Examples
* The missing Item tampered method Is suited to any company that delivers packages.
* Anyone could've stolen your product when using the missing Item tampered method, even the driver.
* An Investigation Is useless with the missing Item tampered method, because they cannot verify what
happened after the package left the carrier's depot.
What Is A 'CRN?'
When using the DNA (Did Not Arrive) Method, by claiming you didn't receive the package that was
delivered by the carrier driver, there's a very high chance that the company will open an Investigation - to
try and establish why It did not make Its way to the correct address. If their records show that the driver left
It unattended at your doorstep, the representative will assume It was stolen and because It appears to be a
theft-related Incident, you may be asked to file a police report and to also provide a "CRN", which Is an
abbreviation of "Crime Reference Number". The rep may use the CRN to check the validity of the report.
Examples
* They might cross-check the police report so don't fake the CRN.
* Don't worry, the CRN Is only used to reference the report.
* Sometimes It takes a while for the police to give the CRN, so be patient.
Even though "MEB" Is not used very often In social engineering communities of all shapes & sizes, It's still
Important to know what It stands for and relates to - namely because you will need to Interpret It at some
point during your SEing activities. Put simply, "MEB" Is an abbreviation of "Manufacturer Empty Box", which
Is the same as the manufacturer missing Item method, as discussed a few topics above, so refer to that
(topic) for further details.
Examples
* Be sure the Item Is less than 120 grams with the MEB method.
* I heard that Argos Is hard to SE using the MEB, Is that true?
* Don't MEB the CPU - It can be seen from the outside of the box.