Professional Documents
Culture Documents
Learning that social engineering isn’t always scary, dark, and evil can go
a long way toward uncovering how certain skills are used. After you
understand those skills, practice and become skilled or proficient in them;
discerning how they are being used against people then becomes much
easier.
You can find places to analyze these skills that are not in the dark corners
of the world. You can read books on psychology, persuasion, and sales,
then observe in the field to see how these skills are used.
Summary
As I conclude this book, I hope it has opened your eyes to the world of social
engineering. I hope that it will continue to help you take note of the potential
for malicious attacks. I hope it has helped you build or maintain a healthy
fear of the potential for disaster.
I also hope this book helps you to protect your businesses, your families,
your children, your investments, and your life. I hope that the information
within has showed you that staying completely secure and protected is not
impossible.
Mati Aharoni, my mentor, says in one of his classes that the reason the
bad guys usually win is because they have dedication, time, and motivation
on their side. Don’t let life get in the way of security. Conversely, don’t let too
much fear of the bad guys keep you from enjoying life.
I hope that applying the principles in this book enhances your ability to
read and communicate more effectively with people around you. Using them
in many aspects of your life, not just security, can prove to be a life-altering
exercise. Social engineering is truly an art form. Enjoy.
Index
Numbers
7-38-55 Rule
419 scam
A
Abagnale, Frank Jr.
active listening, reflective responding and
aggressive approach to interrogation
Aharoni, Mati
program crashes
stamp collection
Air Force training, social incentives and
alcohol, eliciation and
alternate route
Amazon logo
anchoring
anger, microexpressions
anxiety
appearance, rapport building and
arm/hand placement
ask for what you want
assumed knowledge
assumptions in positive manipulation
assumptive questions
Asterisk
attacks