![how to use social engineering toolkit to hack facebook how to use social engineering toolkit to hack facebook](https://noticiasseguridad.com/nsnews_u/2020/04/indira01.jpg)
Most small-medium size businesses do not perform even simple background checks on new hires. Sure going through their trash is nasty but the gems that will be there are invaluable.Ĥ) Get a Job There – If the reward is worth it, just get a job at your target and grab all the information you can. These are all good data points you can use to help make a personal connection to the mark.į.ĝumpster diving. Try to figure out their patterns, interests, places they frequent. Tail them home or to their favorite watering hole. Pretend to be a manager from another office or branch.Į. Things in their workspace area (posters, pictures, books, etc.)ĭ.Ěsking their friends and colleagues. Online site like Linked In, Google, Facebook, MySpace, etc.Ĭ. Parking lot – Cars that are unlocked (or are easily unlocked) might have security badges, uniforms, paperwork, intel, smart phones, wallets, all sorts of goodies you can use.ī. The more information you have about your mark the more likely you are to get what you want from him or her, obviously. My buddy started up a heated fight with his wife before they walked up and the guards just waved them by the checkpoint without checking or wanding them!ģ) Gathering and Using Information – When it comes right down to it the key to being a successful social engineer is information gathering. The park has a guard station to check the bags and a wand to detect metal. A good real world example of this is my buddy wanted to sneak some alcohol into an amusement park. People just want to get rid of angry people, so it works well for asking people to open doors for you or give you information on the location of things, etc. In fact, people are much more likely to obey your wishes when you are angry as well. If you are angry, people are much, much less likely to stop and question you.
![how to use social engineering toolkit to hack facebook how to use social engineering toolkit to hack facebook](https://2.bp.blogspot.com/-bPSue5_GyL0/T0olCcEH2cI/AAAAAAAAAps/VWuL6W9MwBc/s1600/setwithbacktrack1.jpg)
If you find yourself in a situation where you need to go through areas with people that are otherwise likely to stop and question your presence this technique comes in handy. Instead you want the hostile situation to be between yourself and your phone, your accomplice, or mumbling to yourself as if you just had a huge argument with someone. You can create a hostile situation in a ton of different ways just don’t create a hostile situation between you and your marks.
![how to use social engineering toolkit to hack facebook how to use social engineering toolkit to hack facebook](https://miro.medium.com/max/1400/1*yPjDzDlxIbMjDda5l30Ryw.png)
For example, if you are on the phone and fake having a heated conversation with someone people around you will absolutely notice you but they will go out of their way to avoid you as well. Tailgating into a secure area behind someone who is familiar with you works often.Ģ) Creating a hostile situation – People withdraw from those that appear to be mad, upset or angry at something or someone other than themselves. Once you become familiar then you strike. A familiar person, in the eyes of your mark, is perfectly normal, doesn’t set off alarm bells in the brain of “who is that and why are they here”. People are way more comfortable responding and carrying out requests by familiar people than they are with complete strangers. People react differently to people they know, have talked to or at least seen around a lot. Making yourself familiar to those that you want to exploit helps to lower their guard. In a nutshell, you are trying to make it appear perfectly normal to everyone that you should be there. ?ġ) Familiarity Exploit – This is one of the best and is a corner stone of social engineering. I bet you won’t be surprised when they all work. Are you vulnerable to these techniques in your organization? Pick up the phone and try some of them (if you are authorized to of course). Some are from my experiences, some are from my customers, and some are from buddies that use social engineering attacks in their daily job as security consultants. These techniques come from a variety of sources. I’ve collected a list of my top 10 social engineering techniques.