I am learning ethical hacking and i have just started social engineering part. As practice I was able to social engineered a girl and hacker her facebook account. Now to be better at social engineering what you guyz would suggest me any step? (I am beginner)
Forum Thread: How Can I Be Better at Social Engineering?
- Hot
- Active
-
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
3 wks ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
1 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
3 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
3 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
4 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
4 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
4 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
4 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
4 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
5 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
5 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
6 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
7 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
7 mo ago -
Forum Thread: How to Hack School Website 11 Replies
7 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
7 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
8 mo ago
-
How To: Dox Anyone
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Fuzz Parameters, Directories & More with Ffuf
-
How To: Run USB Rubber Ducky Scripts on a Super Inexpensive Digispark Board
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How To: Wardrive with the Kali Raspberry Pi to Map Wi-Fi Devices
-
Tutorial: Password Profiling with CUPP
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Use SQL Injection to Run OS Commands & Get a Shell
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
7 Responses
First I would suggest that you don't do anything illegal ;)
Then check out master OTW's social engineering tutorials on the How To section.
Thanks bro. Sorry for late reply
Step 1: Don't do anything illegal.
Step 2: If you do, don't brag about.
Step 3: ???
Step 4: Profit
Can't understand your 3rd step
Link.
It's all about manipulation and taking advantage of base instincts. Figure out subtle ways that you can generate trust and work with it. Learn how and when to put pressure on the target. It's a lot to do with feeling the situation out and less to do with "to get x result, do y". One big thing that you should work on if you plan on using social engineering through text on English speaking targets, is to get your English up to scratch. Having spelling errors and general non-native flaws in your English will make your attempts much more difficult. Don't get me wrong, your English is great. But it doesn't hurt to refine it.
As for the legality of your motives, I would rather not know.
ghost_
Thanks bro for this explanation. And again thanks.
Just as there is no silver bullet in hacking there is no silver bullet in social engineering. The experience varies from person to person, you will find a person who will throw a million questions your way seeing if you're legit or not. You will also have people who will not question you, or very little, which will make the social engineering alot easier.
This all depends on how you're doing your social engineering as well, if it's in person or if it's not in person. Whether it be through email, messages or over phone.
Each situation will be different, but you will have a similar aproach to each situation.
You say you social engineered a girl on facebook, I wouldn't post about that. Unless permission was given of course.
Share Your Thoughts