Professional Documents
Culture Documents
_INVESTIGAÇÃO ATIVA
2.2. ip, camera, nome do computador, coordernadas, cache, hardware, altitude, software, cookies
2.3.1. FANTOCHE
2.3.1.1. WHATSAPP
2.3.1.1.1. FOTO
2.3.1.1.2. BIO
2.3.2. LINK/DOMINIO/EMAIL
2.3.2.1.1. KDJSFASDJFDSALKFKLASD.COM
2.3.2.1.2. PAY.C6BANK.COM.BR/RECIBO/33939393939383833
2.3.2.1.3. PAY.C6BANK.NET.SITESEGURO.COM/RECIBO/33939393939383833
2.3.2.1.4. netfllx.com.br/entrar
2.3.2.1.5. contatoc6bank@gmail.com
2.3.2.1.6. contato@PAY.C6BANK.NET.SITESEGURO.COM
2.4. STRYTELLING/CENÁRIO
2.5. CAPTURA/TECNOLOGIA
3. _ENGENHARIA SOCIAL
3.1. Definição
3.1.1. “Any act that influences a person to take an action that may or may not be in their best interest”.
3.1.2.1. Hackers
3.1.2.1.3.4. crimes
Link: https://humanbehaviorcon.com/
3.1.2.2. Pentest
3.1.2.4. Scammers
3.1.2.5. Vendedores
3.1.2.6. Governos
3.1.2.6.1. comunicação
3.1.2.6.3. moeada
3.1.2.6.4.1. allAfrica.com: South Africa: Food Used as Election Weapon, Say Monitors
(Page 1 of 1)
Link: https://www.social-engineer.org/wiki/archives/Governments/Governments-
FoodElectionWeapon.html
3.1.2.6.4.1.1. It adds that party activists have used resources and their connections to
government to deny voters, particularly the poor, their right to choose freely: “We continue
to receive reports that food parcels are used to persuade the poor to vote for those who
provide them and that voters are told that they will only receive the social grants and
public services to which they are entitled if they vote for particular parties.
3.1.2.7. "Negociadores"
3.1.2.8. Humanos :)
3.1.2.8.1. crianças
3.1.2.8.2. pais
3.1.2.8.3. jornalistas
3.1.2.8.4. medicos
3.1.2.8.5. policiais
3.1.2.8.6. ...
Conteúdo licenciado para -
3.2. "No Mundo Real"
3.2.1. PESQUISA
Link: https://www.social-engineer.org/social-engineering/social-engineering-infographic/
3.2.2. Phishing
3.2.2.3.1. Dropbox
3.2.2.6. Itau
3.2.2.6.1. BB
3.2.2.7. Netflix
3.2.3. Vishing
Link: https://www.social-engineer.com/analyzing-the-2020-twitter-attack/
Link: https://krebsonsecurity.com/2020/11/godaddy-employees-used-in-attacks-on-multiple-
cryptocurrency-services/
3.2.3.4. COVID
3.2.3.4.1. .
3.2.3.5. India
Link: https://www.youtube.com/watch?v=o2ixj0m4F_E
Vídeo: http:https://www.youtube.com/embed/o2ixj0m4F_E?start=0
Link: https://www.youtube.com/watch?v=daHVD9a_rJU
Vídeo: http:https://www.youtube.com/embed/daHVD9a_rJU?start=0
3.2.3.6.
3.2.3.6.1. .
3.2.3.6.1.1. .
3.2.4. SMiShing
3.2.5. Impersonation
3.2.5.2. Entregadores
3.2.5.2.1. Man posing as delivery person in San Francisco hides resume in box of donuts
Link: https://abc7ny.com/postmates-sf-job-search-marketing-donut-delivery/1545729/
3.2.5.3. Inspeção
3.3.1.1. Comunicação
3.3.1.2.1. Falso coronel conta o que fez para enganar tanta gente por tanto tempo
Link: https://www.youtube.com/watch?v=6cAk6xdgueI
Vídeo: http:https://www.youtube.com/embed/6cAk6xdgueI?start=0
3.3.1.2.2. VIPS
Vídeo: http:https://www.youtube.com/embed/wfJ3OXwSfDU?start=0
3.3.1.3. Microexpressões
3.3.1.3.1. .
3.3.1.4. Rapport
3.3.1.4.1. Rapport é um conceito do ramo da psicologia que significa uma técnica usada para
criar uma ligação de sintonia e empatia com outra pessoa.
3.3.1.4.2.1. Controle
Link: https://www.youtube.com/watch?v=iUmo8Y1LRYE
Vídeo: http:https://www.youtube.com/embed/iUmo8Y1LRYE?start=0
3.3.1.4.2.4. Empatia
3.3.1.4.2.5. Ego
3.3.1.4.2.6.1. como?quando?porque?
3.3.1.5.1. Buffer Overflow é uma situação em que um programa em execução tenta gravar
dados além do que o buffer de memória permite, sobrecarregando assim o sistema.
3.3.1.5.1.1. Os estouros de buffer (Buffer Overflow) podem até executar outros programas
ou comandos maliciosos, resultando assim na execução arbitrária de códigos.
3.3.1.5.2.
3.3.1.5.2.1.1. a gente fala 150 palavras por minuto mas nosso cerebro pode processar
500-600
3.3.1.5.2.2. O Alvo
Conteúdo licenciado para -
3.3.1.5.2.2.1. Comandos de Decisões/Conclusões
3.3.1.5.2.2.1.2. Exemplos
3.3.1.5.2.2.1.2.1. No Marketing
3.3.1.5.2.2.1.2.2. ...
3.3.1.5.3. Entrevistas/Interrogatórios
3.3.1.6.1. Autoridade
3.3.1.6.2. Reciprocidade
3.3.1.6.3. Escassez
Link: https://rockcontent.com/br/blog/gatilhos-mentais/
3.3.1.7. Elicitação
3.3.1.7.2. Interrogatório/Quesitonário
Link:
https://whatreallyhappened.com/RANCHO/POLITICS/CIA_TORTURE/kubark06.htm
3.3.1.7.3.1. "I heard they have seventeen cameras, twelve guards and a fingerprint scanner
in their lobby. They say that place is like Fort Knox! Nobody can get in."
3.3.1.8. Pretexting
3.3.1.8.1. Pretexting is a type of social engineering attack that involves a situation, or pretext,
created by an attacker in order to lure a victim into a vulnerable situation and to trick them into
giving private information, specifically information that the victim would typically not give outside
the context of the pretext.
3.3.1.8.1.1. .
3.4. https://www.social-engineer.org/framework/general-discussion/