This week Logan and Ally take part one in social engineering. What is social engineering you might ask?
Social engineering targets people, instead of a physical computer, and relies on individuals or groups of people breaking security procedures, policies, and rules. It can be done physically, or electronically. A good social engineer will find and exploit human weaknesses and behaviors to accomplish their goals.
The most important thing to remember is that it can be done in person, over the phone, via text message or email, or any method where you can engage with your target.
It requires a good understanding of human behavior and human weaknesses. The goal is to persuade your target to provide information or access that would allow you to succeed in your goals. It highlights a few key methods:
- Trust
- Reciprocation
- Authority
- Urgency
- Fear
- Likeness
- Social Proof
- Scarcity
- Helpful Nature
Stay tuned next week for Part 2!
Music: Xenon Sentry by Shane Ivers - https://www.silvermansound.com
Follow Logan and Ally:
- Rogue Dynamics IG
- Rogue Dynamics
- Ally Marie IG
- Ally Marie
Listen and Subscribe:
- Apple Podcasts
- Spotify
- Stitcher
- Buzzsprout
Please support the show! If you're enjoying the show, subscribe and leave a rating on Apply Podcasts. And if you liked this episode, share it with your friends!
Get full access to Rogue Dynamics at roguedynamics.substack.com/subscribe