An example of social engineering
One of the easiest ways to gather information
||Courtesy of Fravia's searching lores
Yes, this kind of social engineering tricks are very important, and are actually part of the
essays section as well. Searchers are well advised to learn
the basic social engineering techniques. Stalkers needs to know them as well.
hackers need social engineering quite a lot and reversers almost as much. Come to think of it
it would wonder me that you, dear reader, will never find an use for this kind of lore... :-)|
Note also the simple, yet deep truth underlined by _A&T: "if you are
trained in computer sciences, you unconsciously tend to think that everything that is easy
for you is easy also for the others; well, it's not! All the knowledge you have built
during many years is a mystery for them. On the net, you often find expert and trained
people, because it's the right place to find them. Everywhere else in the world,
they are rare".
How true, and how important! I notice myself how annoyed I often get for the slow pace that
most relatives, friends or collegues of mine use when dealing with PC or Web-related stuff.
What's obvious for anyone of us is a mistery for most fellow humans, funny, but also, maybe,
ahem, "resourceful", as well... eheh :-) Ach Ja: don't forget this deep truth when luring... are you
luring or are you being lured out of your water? "Never forget it: On the web fishes
eat fishes, and you never know exactly on which side of this "alimentary" equation you actually are :-)"
||There is a crack,
a crack in everything
That's how the light gets in
(X)Beginner ( )Intermediate (
I'm not a native English speaker, as you will soon
discover reading this
please forgive any mistakes.
An example of social engineering
One of the easiest way to gather information
Often you spend a lot of energy trying to gather
informations using all the net resources you can
think of... and that's ok, but sometimes there
is another method, easier and quicker. Reading this
you will find I started the other way round, that is,
I had some 'real world' infos and used them to get
'virtual' ones, something you have probably often
A working brain.
Yeah, after reading several essays from Fravia's pages
we are all experts
in reversing apps, searching the web and stalking
enemies, aren't we?
If we want to find someone on the net, we know we have
lots of tools to
begin with, like Dejanews, or DNS records.
Now I want to tell you of a powerful technique, which
is mainly used
for hacking-related efforts, but works well almost
whenever you can apply
Social engineering means "fooling people into telling
you what you want to
even if they are told not to/you are not entitled
to/they don't want to/and
The 99% theory
What all that means for us? It's easy to guess: if you
are trained in
computer sciences, you unconsciously tend to think
that everything that is
for you is easy also for the others; well, it's not!
All the knowledge you
have built during many years is a mystery for them. On
the net, you often
find expert and trained people, because it's the right
place to find them.
Everywhere else in the world, they are rare.
The most astonishing aspect is that it works! The
reason goes more or less
of the 6 billions people in the world, 1% are
intelligent beings, the other
99% blindly follow their lead. No, I am not saying
that they have no brain:
previous sentence applies for each aspect of our life
I can not paint like Bilibin :-), nor I will able to
do it in my entire
life. For this,
I reside on the 99% side. But talking of computers, I
know only one guy who
beat me (in 'real' life, of course, the Net is full of
talented people), so
I stay on the 1% side. I bet the same is true for the
majority of you, since
are reading Fravia's pages. If not, carry on and study
some more essays, you
surely change your status.
Now to the interesting part: after have picked up your
"victim", he/she will
almost surely reside on the 99% 'blind' side, and you
have a huge
you simply know what you are talking about, he does
I will give you a small example, very simple and
straightforward, but I am
and this is the first which came to my mind, since
it's the last I did.
So there was a guy, the story is long and I am going
to write down only the
parts. I exchanged some e-mail with him, and I was
sure he was hiding
important to me. Here are the relevant things I knew
- He was from my own country, so there was no
(this is a must! If you cannot speak his language
very well, you
have almost lost)
- He had a hotmail account, so I knew his login
(almost all "free" accounts can give you a LOT of
info about your target! Best thing to do: Open such an account by
yourself on the same provider and discover what you can - and what you
cannot - gather!)
- He was not a computer guru, he was clearly at the "99%" low-life level
(careful with this! Though it works MOST of the time, many clever ones fake
absolute stupidity when trying to lure YOU out! Never forget it: On the web fishes
eat fishes, and you never know exactly on which side of this "alimentary" equation you actually are :-)
So what? Well, I wanted to read his past mail. I was
betting that, like most
99%-sided people, he was not deleting it after
reading. So I tricked him to
tell me his
snail-mail address, which people often give away with
little concern, btw.
A quick call to the local telephone company gave me
Here begins the difficult part: you have to play the
- Find a quiet place, possibly with some low
'office' sound on the
- You should be alone, with no one listening to your
- If you think your victim has a caller ID, that is,
he can track the
you are calling from, 'borrow' some telephone at work
or somewhere else.
- Take some deep breaths, your voice must be polite
and look used to
conversations, try to learn from all the telephonists
you talk with.
- If you are a woman and your victim is a man, you
have another little
advantage over him, talk with a happy tone and he will
answer everything you
- If you can exibit a good knowledge of his personal
data, he will gladly
just that small gap you need.
I picked up the telephone and called him, at
"Good morning sir, I am (insert faked name here), I am
willing to speak with
victim's name here)"
"Yes, hold on please"
"Hello, I am (victim's name)"
"Good morning sir, I am an employee of the local
Hotmail agency (btw, I
Hotmal has 'local agencies'), I am sorry I am
calling you so
"Uh, hotmail, well, I was having breakfast, but it
(victim is surprised)
"I was able to call you because of the personal data
form you filled when
account, so don't be surprised" (with eye-blinking
"My pers.. oh, yes"
"I have to inform you that we had a hard disk crash
tonight, and we are
to restore all our user's mail."
"A crash? Is my mail lost?"
"Oh no, sir, we can restore it. But, since we are
simple employees, and we
allowed to mess with our user's mail, we need your
password, otherwise we
take any action"(first try, probably
"Er, my password? Well..."
"Yes, I know, you have read on the license agreement
that we will never ask
but it was written by the legal department, you know,
all law stuff that's
to open business and such. (effort to gain victim's
Your username is (insert victim's username), isn't it?
Legals gave us your
username and telephone, but, as smart as they are, not
See, without your password nobody can access your
mail, even we hotmail
But we have to restore your mail, and we need access.
You can be sure we
use your password for anything else, well, we will
"Well, it's not so secret (also smiling! it's
amazing...), my pass is
"Thank you very much, sir. We will restore your mail
in a few minutes"
"But no mail is lost, isn't it?"
"Absolutely, sir. You should not experience any
problems, but do not
contact us just in case. You will find contact numbers
on our web page"
victim has probably never read from begin to
"Thanx, you are very efficient, goodbye"
And that's all. You see, nothing difficult. This time
was easy, because no
came from the victim. Often you need a ready
imagination to reply with
arguments. You don't need to be, just pretend you are,
and remember that you
on the 1% side :-)
Obviously this essay talks about a completely
people into giving away their passwords seems to be illegal, in
some countries.Therefore, if you happen to live in one of those countries, and if
you respect the law, and if
you are - naively -
taking each and every word of this essay literally, this text could be seen as something
illegal as well.
you are a
smart reader, aren't you? So I'm sure you can see the irony between
BTW: Can you see the irony between
the following three lines? :-)
(c) 2000: [fravia+], all rights reserved