POPULARITY
Dr Guenther interviews Chris Hadnagy, master hacker and author of the best-selling book Human Hacking. The post Brain Matters S11.E15: Social Engineering: The Art of Human Hacking first appeared on Capstone Voices Podcasting Network.
“Understanding the ways humans make decisions is integral in everything we do from maintaining security to communicating with the people in your life. Social engineering skills, when used properly, can make your life so much better.” – Chris Hadnagy Welcome back to Turmeric & Tequila with your host, Kristen Olson, where we dive into the delicate balance of disruption and dialogue in pursuit of a better way. In this episode, we're thrilled to have Chris Hadnagy, a distinguished leader in the field of social engineering. Kristen and Chris explore the complexities of human behavior, uncovering the motives behind our actions and the profound influence of ethical social engineering. From Chris's diverse career path to his work in cybersecurity and his nonprofit organization, the Innocent Lives Foundation, this conversation is rich with insights on communication, ethical influence, and the intersection of human connection with modern technology. Tune in as we discuss the importance of emotional intelligence, the evolving landscape of AI, and the ways we can use social engineering practices for the greater good. If you're passionate about understanding and improving human interactions, this episode is a must-listen. Time Stamps: 00:00 Sponsors Shoutout and Highlights 05:48 Ethical Hacking Framework Development 09:22 Creative Pretexts for Infiltration 11:01 Cybersecurity: Protecting, Educating, Enhancing Lives 14:47 Geolocating Dark Web Exploiters 17:22 Addressing Digital Sextortion Challenges 19:54 Supportive Parenting Through Mistakes 23:09 Instant Gratification's Hidden Costs 28:28 Podcaster on Human Stories & Challenges 30:48 Workshops on Elicitation and Non-verbals 34:12 Parental Safety Advice Scenario 36:28 Apologizing Builds Respect 40:00 AI: A Double-Edged Sword 43:30 Connect with Me on LinkedIn 47:10 Family Over Fortune 49:39 "Life Skills Through Sports" Chris Hadnagy: Chris Hadnagy is the Founder and CEO of Social-Engineer, LLC. During Chris' 19 years in information security, he created the world's first social engineering framework and newsletter. He has also hosted the first social engineering-based podcast. Chris is the Founder, Executive Director, and Board Member, for the Innocent Lives Foundation, a nonprofit organization that identifies anonymous child predators and helps bring them to justice. Having written five books on social engineering, Chris is also a well-known author. His most recent book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” was released January 5, 2021. Chris leads the way in educating people about social engineering. He created the world's first Social Engineering Capture the Flag (SECTF) to raise awareness of this serious threat. Chris is also an Adjunct Professor of Social Engineering for the University of Arizona's NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). And he also lectures and teaches about social engineering around the globe. Moreover, he was invited to speak at the Pentagon and other high-security facilities. Chris works with some of the world's leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers. Chris is certified as an Offensive Security Certified Professional (OSCP), as well as an Offensive Security Wireless Professional (OSWP). He is also the creator of the Social Engineering Pentest Professional (SEPP), Certified Ethical Social Engineer (CESE), and Master's Level Social Engineering (MLSE), certifications. Chris' published books include: – Social Engineering: The Art of Human Hacking – Unmasking the Social Engineer: The Human Element of Security – Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails – Social Engineering: The Science of Human Hacking 2nd Edition – Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You https://www.facebook.com/socialengineerllc/ https://www.instagram.com/socialengineerllc https://www.linkedin.com/in/christopherhadnagy/ Connect with T&T: IG: @TurmericTequila Facebook: @TurmericAndTequila Website: www.TurmericAndTequila.com Host: Kristen Olson IG: @Madonnashero Tik Tok: @Madonnashero Website: www.KOAlliance.com WATCH HERE MORE LIKE THIS: https://youtu.be/ZCFQSpFoAgI?si=Erg8_2eH8uyEgYZF https://youtu.be/piCU9JboWuY?si=qLdhFKCGdBzuAeuI https://youtu.be/9Vs2JDzJJXk?si=dpjV31GDqTroUKWH
Chris Hadnagy - Human Hacking by Richard Dugan
Welcome to this episode of The Tonic, terrestrially broadcast on December 7 and 8 2024 on AM740 and FM 96.7 in Toronto. Topics covered on the show track the lifestyle articles and themes published in The Tonic Newsletter and on the Tonic Website. We'll discuss the inspiration for his debut album with Canadian recording artist RISHI, how to pay better attention with the Tonic roundtable of experts, dietician Shauna Lindzon, rehab specialist Sender Deutsch and researcher David Nelson, which cookbooks you should buy for loved ones this holiday season with Tonic cookbook reviewer Naomi Bussin and human hacking: how to harness empathy, generosity and kindness for better communication with author Chris Hadnagy.
Today's threat actors and social engineers leverage social media to observe individuals' patterns and habits. They encounter you at a coffee shop or another familiar spot. They begin to establish trust, which makes you more susceptible to their tactics. Today's guest is Peter Warmka. Peter is a retired CIA officer with over two decades of breaching the security of organizations overseas in pursuit of intelligence. He is the founder of The Counterintelligence Institute, author of two books, conference speaker, consultant, and educator on the dangers of human hacking. Show Notes: [0:56] - Peter shares his background and what he has done in his interesting career. [3:27] - The Counterintelligence Institute helps organizations and individuals understand what types of information threat actors are trying to steal. [6:08] - Peter discusses the surprise his friends and family experienced when learning he had been working for the CIA. [9:13] - There are some skills that Peter had to learn when going into this career, but other skills came more naturally. [11:15] - Trust is different in various societies, and Americans are particularly vulnerable. [13:31] - Peter explains how he developed trust with others. [16:00] - There are ways to leverage trust in this type of work. [19:32] - Peter discusses international breaches and the types of intelligence breaches from other governments. [23:11] - The internet has made information so readily available to everyone, including information you may not want them to have. [25:19] - There are different types of information found on the different kinds of social media platforms that all come together to paint a whole picture. [28:09] - Human hacking, or social engineering, can be accomplished through five different communication channels. [31:21] - Peter describes a very powerful and common in-person scenario. [35:53] - We have to get away from the silo-approach, thinking that breaches are only coming from the IT network. [37:24] - Peter wrote a book in the early days of Covid-19 for organizations. He then wrote a book geared more towards individuals. [39:41] - Privacy and security settings are great, but platforms can still be hacked. [41:56] - It shouldn't be “trust, then verify.” It needs to be “verify, then trust.” [44:27] - AI tools have made things even more complicated for victims and easy for threat actors. [46:37] - LinkedIn specifically is overwhelmed with fake accounts. [48:50] - Workplace education on this topic is backwards in organizations since they are seen as compliance training. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Counterintelligence Institute Website Peter Warmka on LinkedIn
In this episode of the Cyber Rants Podcast, we sit down with Chris Hadnagy, a prominent speaker at RSA, Black Hat, and DefCon's SE Capture the Flag events. Chris is the author of four influential books, including "Social Engineering: The Art of Human Hacking" and "Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You." He is also the founder of the Innocent Lives Foundation, a nonprofit dedicated to fighting the sexual abuse of children, and the CEO of Social-Engineer, LLC.Join us as we delve into Chris's extensive background in social engineering across corporate, government, and military sectors. Learn why social engineering is so effective and the kind of damage it can cause, along with the most common and sophisticated techniques used by cybercriminals today. Chris also shares the best strategies for protecting companies from malicious social engineering and discusses innovative personal security tips, such as human-based MFA and unique code words for family safety.Chris's Company: https://www.social-engineer.comInnocent Lives Foundation: https://www.innocentlivesfoundation.org/The Human Behavior Conference 2024 (OCT 30 in Orlando): https://humanbehaviorcon.com/
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by May Brooks-Kempler. May is a cybersecurity expert who has transformed her early curiosity, hacking 90's computer games, into a distinguished cybersecurity career. As a board member of ISC2, an educator, a CISO and the founder of the Think Safe Cyber community, she is dedicated to making the online world a safer place for everyone. [July 15, 2024] 00:00 - Intro 00:19 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:17 - May Brooks-Kempler Intro 03:55 - Twist of Fate 05:10 - A Moment of Silence 05:51 - Blame Grandma 08:15 - An Unclear Path 11:34 - It Takes a Village 13:40 - Considering the Other Side 16:10 - Start with "Why" 20:41 - "It's Never Personal - CyberWise Parenting Course - Listeners get 20% off with the coupon SOCIAL - TEDx – Think Cyber 27:47 - Lifelong Learning 30:50 - Going Public 32:57 - Find May Brooks-Kempler online - LinkedIn: in/may-brooks-kempler - Instagram: @cybermaynia 33:46 - Mentors - Avi Weissman - Oren Bratt - Itzik Kochav 35:54 - Book Recommendations - Human Hacking - Christopher Hadnagy - Countdown to Zero Day - Kim Zetter - Do You Talk Funny? - David Nihill - Start with Why - Simon Sinek 37:17 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Chris Hadnagy, a prominent figure in the field of information security, particularly known for his expertise in social engineering. He is the founder and CEO of Social-Engineer, LLC, a company dedicated to security training and consulting. Chris has authored several influential books on social engineering, including "Social Engineering: The Art of Human Hacking" and "Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You.”In addition to his work with Social-Engineer, LLC, Chris is the founder and executive director of The Innocent Lives Foundation, a non-profit organization that works to unmask anonymous online child predators and assist law enforcement in bringing them to justice. He also serves as an adjunct professor at the University of Arizona, where he teaches courses on social engineering at the NSA-designated Center of Academic Excellence in Cyber Operations.Chris' contributions to information security include creating the world's first social engineering framework and newsletter, and he has been involved in various high-profile speaking engagements at conferences like RSA and Black Hat. He is certified as an Offensive Security Certified Professional (OSCP) and has developed several certifications related to social engineering, such as the Certified Ethical Social Engineer (CESE) and the Master's Level Social Engineering (MLSE) certifications.Support the Show.
Summary In this conversation, Dave Prior interviews Chris Hadnagy and Dr. Abbie Maroño about social engineering and human hacking. They discuss the definition of social engineering and how it differs from human hacking. They emphasize the importance of intent in social engineering, with the goal being to influence someone's actions for their benefit rather than to cause harm. They also explore the concept of imposter syndrome and how it affects different generations and genders. The conversation concludes with a discussion on how self-awareness can be used to be a better servant leader and understand others. In this conversation, Dr. Abbie and Chris Hadnagy discuss the importance of understanding human behavior and communication in various contexts. They emphasize the need to look beneath the surface when someone behaves badly and to consider their underlying needs. They also discuss the importance of self-awareness and understanding one's own communication style. They highlight the value of seeking credible information and avoiding misinformation, especially in the field of psychology. They provide insights into their courses and books that can help individuals improve their communication skills and become more effective in their personal and professional lives. This podcast was originally recorded in video format. You can find the video here: https://youtu.be/71cZz-ac-zc Takeaways Social engineering is the act of influencing someone to take an action that may or may not be in their best interest. Intent plays a crucial role in determining whether social engineering is positive or negative. Imposter syndrome is a universal human experience, but the way it is expressed can differ between generations and genders. Self-awareness is key to understanding and managing imposter syndrome and can be used to be a better servant leader. Understanding the emotions and motivations of others can help build empathy and improve relationships. Look beneath the surface when someone behaves badly and consider their underlying needs. Understand your own communication style and be aware of how it may impact others. Seek credible information and be cautious of misinformation, especially in the field of psychology. Take courses and read books to improve your communication skills and personal development. Chapters 00:18 Introduction and Background 10:26 Exploring Imposter Syndrome Across Generations 24:11 Understanding Others: Building Empathy 31:50 Seeking Credible Information 39:57 Challenging Simplistic Explanations Links from the podcast: Foundational Application of Social Engineering https://www.social-engineer.com/product/foundational-application-of-social-engineering/ Chris's books on Amazon https://tinyurl.com/mrx6umcb Dr. Abbie's Book Work in Progress: The Road to Empowerment, The Journey Through Shame https://tinyurl.com/jzbsu2ev Social-Engineer YouTube Channel https://www.youtube.com/@Social-Engineer Dr. Abbie's TEDX Manchester talk https://www.tedxmanchester.com/abbie-marono/ Contacting Chris Hadnagy Web: https://www.social-engineer.org/ Blog: https://www.social-engineer.org/blog/ LinkedIn: http://linkedin.com/in/christopherhadnagy Contacting Dr. Abbie Maroño Web: https://www.abbiemarono.com LinkedIn: http://linkedin.com/in/dr-abbie-maroño-phd-35ab2611a
It seems every other week we discover a new way that scam artists or hackers can steal our information, whether that's personally or professionally. Do you think your personal data is protected? Chris Hadnagy is an expert hacker and has made it his business to try and hack into your accounts, your security systems, and detect if you have any vulnerabilities. Hadnagy joined us on NightSide to answer your questions and give you tips for protecting your personal data!Ask Alexa to play WBZ NewsRadio on iHeart Radio!
"Win Friends, Influence People, and Leave Them Better Off for Having Met You"
Christopher Hadnagy, CEO of Social Engineer, LLC, joins us to discuss his expert findings and the science behind social engineering. We discuss how to stop social engineering, risks of newest types of social engineering, and how to defend against social engineering. Check out Chris's newest book HUMAN HACKING here. Want to help stop online child predators? Check out The Innocent Lives Foundation. We discuss the science behind social engineering and how it can be used to manipulate and deceive people. We explore the impact of stress and anxiety on vulnerability to social engineering attacks and the concept of amygdala hijacking. The conversation also covers different types of social engineering, including phishing, spear phishing, quishing, and vishing. The episode concludes with a discussion on the importance of awareness and defense against social engineering attacks.Social engineering is a tactic used by cyber criminals to manipulate and deceive people.Stress and anxiety can make individuals more vulnerable to social engineering attacks.Amygdala hijacking is a physiological and psychological response that occurs when external stimuli trigger a fight or flight response before the brain can process the situation.Chapters00:00 Introduction to Social Engineering03:23 Christopher Hannegy's Background and Experience06:09 Christopher Hannegy's Journey as an Author09:30 The DISC Assessment and Its Importance13:17 The Science Behind Social Engineering16:35 The Impact of Stress and Anxiety on Social Engineering19:45 Amygdala Hijacking and Its Effects23:39 The Increase in Social Engineering and AI27:10 Different Types of Social Engineering30:08 The Rise of Vishing and Deepfake Technology37:02 The Importance of Awareness and Defense37:54 ConclusionTry KiteWorks today at www.KiteWorks.comVideo Explanation Try KiteWorks today at www.KiteWorks.comDon't miss this Video on it!The Most Secure Managed File Transfer System. Get Aura today! Complete Online Safety from friends at Cyber Threat Group. Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women's clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Air Date - 14 December 2023Join Dr. Kevin and Christopher Hadnagy, author of Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You.Drawing from this knowledge, he has created a book that empowers readers to enhance their self-awareness, sharpen their communication skills, and achieve personal and professional goals.Some of the valuable and actionable tools included in "Human Hacking":* Establishing rapport and connections with strangers* Leveraging body language and verbal cues for effective communication* Guiding conversations to achieve desired outcomes* Defending against manipulation and deceitTune-in at HumanHacking 6 PM EST - call in with questions and comments 202-570-7057.Visit the Dr. Kevin Show page at https://omtimes.com/iom/shows/dr-kevin-show/Connect with Dr. Kevin Ross Emery at http://www.mydrkevin.com/#HumanHacking #ChristopherHadnagy #DrKevinRossEmery #TheDrKevinShowSubscribe to our Newsletter https://omtimes.com/subscribe-omtimes-magazine/Connect with OMTimes on Facebook https://www.facebook.com/Omtimes.Magazine/ and OMTimes Radio https://www.facebook.com/ConsciousRadiowebtv.OMTimes/Twitter: https://twitter.com/OmTimes/Instagram: https://www.instagram.com/omtimes/Linkedin: https://www.linkedin.com/company/2798417/Pinterest: https://www.pinterest.com/omtimes/
Social engineering is all about understanding how people think, react, and make decisions! How can we use it to get what we want and help others at the same time? What drives individuals to unwittingly divulge sensitive information? What can you do if you want to connect better with others? In this episode we're diving deep into the fascinating world of human behavior with none other than the renowned expert, Christopher Hadnagy. He is the Founder and CEO of Social-Engineer, LLC. During Chris' 19 years in information security, he created the world's first social engineering framework and newsletter. He has also hosted the first social engineering-based podcast. Chris is the Founder, Executive Director, and Board Member, for the Innocent Lives Foundation, a nonprofit organization that identifies anonymous child predators and helps bring them to justice. Having written five books on social engineering, Chris is also a well-known author. His most recent book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” was released January 5, 2021. Chris leads the way in educating people about social engineering. He created the world's first Social Engineering Capture the Flag (SECTF) to raise awareness of this serious threat. Chris is also an Adjunct Professor of Social Engineering for the University of Arizona's NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). He also lectures and teaches about social engineering around the globe. Moreover, he was invited to speak at the Pentagon and other high-security facilities. Chris works with some of the world's leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers. Enjoy
-Life as a Social Engineer- Explore the intriguing world of a Social Engineer in this enlightening career conversation. The featured guest, Chris Hadnagy is a social engineering pioneer within the industry. Aside from running his own business Social Engineer LLC, he is also known worldwide for lecturing, teaching and writing about this topic. With speaking engagements at the Pentagon and other secure facilities, he brings unparalleled expertise to the table and leads the charge in educating people about this significant threat social engineering poses when used for malicious purposes. Gain insights into this fascinating line of work from day-to-day experiences to captivating stories, you'll learn the ins and outs of life as a social engineer. Further you'll get a look at how AI is shaping the field moving forward. Don't miss this talk if you're curious about the hidden realities of social engineering and the future of information security. To learn more about Chris and his work, be sure to follow him here: Social Engineer LLC The Innocent Lives Foundation Linkedin Instagram X Facebook YouTube FRIENDLY REMINDERS: And hey! Why don't you check out some video highlights of the talk over on YouTube? By liking, commenting or subscribing you'd be helping a ton as far as supporting this program. Subscribe on YouTube here I'd highly appreciate it! -Christopher Follow LIFE AS A.. on your favourite social platforms via these links: Youtube Linkedin: Twitter: Instagram: Facebook:
SuperPower Up! | Super Power Kids | Sex, Love and SuperPowers | SuperPowers of the Soul
Energetics and Human Hacking How can we better our lives using the combined sciences of energetics and human hacking? In this episode of The Science of Superpowers, Chris Hadnagy and Tonya Dawn Recla discuss their experiences using human dynamics in everything from cybersecurity to online protection to greater interpersonal interactions. Chris shares [...]
Energetics and Human Hacking How can we better our lives using the combined sciences of energetics and human hacking? In this episode of The Science of Superpowers, Chris Hadnagy and Tonya Dawn Recla discuss their experiences using human dynamics in everything from cybersecurity to online protection to greater interpersonal interactions. Chris shares [...]
Full episode herehttps://www.spreaker.com/episode/57019604Get access to every episode of WTFrick Live!https://spreaker.page.link/9ZpAVK99G2UBaBT57Forbidden Knowledge Network https://forbiddenknowledge.newsThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/3589233/advertisement
WTFrick LIVE Emily Menshouse and Will Martinez WELCOME Dr. C to the show!!!!Dr. C earned her PhD in neuroscience and a Bachelor of Science degree in Psychology. Her path took a profound turn when she underwent a transformative spiritual awakening, which was further intensified by a near-death experience. During her explorations of the spiritual realm, she found herself subjected to what she suspected were advanced technologies, including V2K and other forms of human hacking, all disguised as mystical experiences.While attempting to break free from these disturbing encounters, she came to realize that the true nature of reality is far removed from the portrayals seen on television. Her journey led her to the revelation that there exist numerous alternate dimensions, matrices, and parallel universes, all accessible through the phenomenon of reality shifting. Now, Dr. C dedicates herself to coaching and guiding others on how to escape their personal nightmares and break free from stagnant situations, drawing from her own transformative experiences.You can follow Dr. C on all social media platforms:Rumble:https://rumble.com/user/sacredjourneyproductionsTikTok:https://www.tiktok.com/@sacredjourneyproductionsWill Martinez ~ Dark Fringe Radio:Check out DFR Website: https://darkfringeradio.com/Follow on FB: https://www.facebook.com/darkfringeradioGet all of WTFrick LIVE's podcasts, where to watch, and merchandise:https://www.emilymenshouse.org/WTFrickLIVESubscribe on Rumble: https://www.rumble.com/user/WTFrickLIVE#mindcontrol #voicetoskull #voiceofgod #military #government #science #thevoice #wtfrickliveThis show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/5653755/advertisement
✔ Create and Manage your Content Easier with The Content Creation Toolbox: https://pages.evanshank.com/products/social-content-toolbox-notion-template ✔ Which One-Person Business Should You Start? Take the quiz to find out! https://evanshank.com/cf-quiz ✔ A Simple Checklist to Ensure Your Marketing Emails are Top-Notch: https://evanshank.com/ultimate-email-checklist ✔ Additional Articles Built for Solopreneurs: https://evanshank.com/articles ✔ Join hundreds of others on the M&M email list: https://evanshank.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/mm-mondays/message
Bulletproof Dental Practice Podcast Episode 312 Hosts: Dr. Peter Boulden and Dr. Craig Spodak Guests: Jeff Hopeck KEY TAKEAWAYS: Introduction Introduction: How to Become Bulletproof The OPM Hack and Sophisticated Hacking Existing Problems and Vulnerabilities Rise of Human Hacking and Exploitation Social Hacking and Target Exploitation Protecting Investments and Expanding Practical Advice for Protection Web Scraping and Dark Web Taking Action and Seeking Cybersecurity Establishing Cyber Baseline Transparency and Cybersecurity Cybersecurity Concerns and CEO Worries Facing Competitive Challenges Micro-Awareness and Key Insights Safety Measures and Human Hacking Story Conclusion: Creating Awareness References: Bulletproof Mastermind Bulletproof Summit Mighty Networks: Bulletproof Dental Practice
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [May 22, 2023] 00:00 - Intro 00:18 - Patrick Laverty Intro 00:58 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 08:58 - Todays Topic: Human Hacking Book Discussion 13:52 - From "Tech" to "Storytelling" 18:51 - Experience Not Required 22:02 - The Importance of Knowing Yourself 25:43 - A Foundation in Communication 29:04 - Principles of Influence 31:32 - Leveling the Playing Field 35:35 - Elicitation Breakdown 40:22 - Understanding the Baseline 44:31 - Dress for the Job (You're Pretending to Have) 48:00 - The Forgotten Resources 49:39 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy - Patrick Laverty - Twitter: @plaverty9 - LinkedIn: linkedin.com/in/plaverty9
This is your path to becoming a master hacker. From zero to getting the skills you need to be successful. // MENU // 00:00 - Coming up 00:43 - Top skills for hacking 01:34 - The Hacker Mindset 01:49 - Analytical/Problem Solving Skills // Be creative 05:34 - Persistence // Never give up 08:50 - CompTIA A+ and basic computer skills 09:21 - Networking skills // CompTIA Network+ and virtualisation 09:47 - Linux // CompTIA Linux+ 10:18 - Virtualization 12:02 - Basic Wireshark knowledge // Practical Packet Analysis 13:48 - Security concepts and technologies // CompTIA Security+ and Hackers-Arise Security+ Training 15:48 - Scripting skills // Python and GO 17:40 - Database skills // SQL injection 19:04 - Web application skills 19:57 - Forensics background // Understanding what you leave behind 21:28 - Learn more on Hackers-Arise.com 22:35 - Cryptography skills 23:42 - Conclusion // Videos mentioned // Top hacking books: https://youtu.be/trPJaCGBbKU Wireshark with Chris Greer: https://www.youtube.com/playlist?list... Vickie Li Bug Bounty Bootcamp: https://youtu.be/QqrK294l_oI // BOOKS // - Linux basics for hackers by Occupy the Web: https://amzn.to/3A2oJM1 - Gray Hat Hacking Sixth Edition, The Ethical Hacker's Handbook by Various Authors: https://amzn.to/3TkI0Pr - This is how they tell me the world ends by Nicole Perlroth: https://amzn.to/3NWj3st - Hands on Hacking by Matthew Hickey and Jennifer Arcuri: https://amzn.to/3WImAia - Penetration Testing by Georgia Weidman: https://amzn.to/3UL1i1D - The Science of Human Hacking by Christopher Hadnagy (social engineering): https://amzn.to/3UssbaM - Getting started becoming a master hacker by Occupy the Web: https://amzn.to/3EmguNa - Black Hat Python by Justin Seitz and Tim Arnold: https://amzn.to/3yQIdTD - Hacking Connected Cars by Alissa Knight: https://amzn.to/3G5cRN5 - Hacking: The Art of Exploitation by Jon Erickson: https://amzn.to/3ElVhTI - The Pentester Blueprint by Phillip L. Wylie and Kim Crawley: https://amzn.to/3WIoGP4 - Hacking API's by Corey J.Ball: https://amzn.to/3EfXDT5 - Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3GlG8U3 - Network basics for hackers by Occupy the Web (coming in 2023) // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web's SOCIAL // Twitter: https://twitter.com/three_cube // OTW Security+ // https://www.hackers-arise.com/security // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot cybersecurity cybersecurity jobs hacking comptia comptia a+ comptia network+ wireshark vmware wireshark sql sql injection comptia security+ python golang perl digital forensics database cryptography ethical hacking hacking jobs hack the box try hack me pico ctf htb thm cyber security career cybersecurity cybersecurity careers ceh oscp ine elearn security ejpt oscp oscp certification ctf for beginners first job cybersecurity job kali kali linux Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel #kalilinux #hacking #cybersecurity
There is something about a good spy story that seems to really resonate with people in the cybersecurity world. We love watching the moves and the counter moves, and the sneaking around, and the social engineering, and hacking, and all of the gadgets and toys, and car chases, and fights and double crosses and triple crosses. Yeah, you get the point. But how much of that is real and how much can be chalked up to an author's creative license? And what's life and work like for real people in the intelligence industry? This episode features two guests: ex-CIA agent Peter Warmka and Andrew Hammond, historian and curator at the International Spy Museum. Guests: Peter Warmka (LinkedIn) (Twitter) (Website) Andrew Hammond (LinkedIn) (Twitter) (Website) Books and References: Confessions of a CIA Spy: The Art of Human Hacking, by Peter Warmka The CIA Guy & CIA Spy Podcast, Peter Warmka and Robert Siciliano Peter Warmka Videos International Spy Museum website SpyCast Podcast, hosted by Andrew Hammond INTEL.gov The Evolution of Espionage in America, INTEL.org Perry's Books Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com
What are the top hacking books to get started? Practical and good hacking books? OTW discusses his favourite Hacking and cybersecurity books with me. Do you agree with him? Did we miss any great books? // MENU // 00:00 - Coming Up 00:20 - Intro 00:25 - Welcome Back OccupyTheWeb 00:55 - Network Basics for Hackers 02:04 - Other Books Releasing 02:51 - OccupyTheWeb Book Recommendations 03:22 - Linux Basics for Hackers 05:02 - Gray Hat Hacking 05:52 - This is How They Tell Me the World Ends 07:49 - Hands On Hacking 09:33 - Penetration Testing 10:56 - Getting Started Becoming a Master Hacker 12:11 - The Science of Human Hacking 14:01 - Black Hat Python 15:25 - TikTok 16:15 - Hacking Connected Cars 17:47 - Hacking: The Art of Exploitation 18:29 - Pentesting Blueprint 19:21 - Hacking APIs 19:54 - Bug Bounty Bootcamp 21:02 - Books Conclusion 21:46 - Networking 22:58 - Conclusion 23:55 - Web Hacker's Handbook 24:29 - Go 25:39 - Hacker's Playbook 26:45 - Outro // BOOKS // - Linux basics for hackers by Occupy the Web: https://amzn.to/3A2oJM1 - Gray Hat Hacking Sixth Edition, The Ethical Hacker's Handbook by Various Authors: https://amzn.to/3TkI0Pr - This is how they tell me the world ends by Nicole Perlroth: https://amzn.to/3NWj3st - Hands on Hacking by Matthew Hickey and Jennifer Arcuri: https://amzn.to/3WImAia - Penetration Testing by Georgia Weidman: https://amzn.to/3UL1i1D - The Science of Human Hacking by Christopher Hadnagy (social engineering): https://amzn.to/3UssbaM - Getting started becoming a master hacker by Occupy the Web: https://amzn.to/3EmguNa - Black Hat Python by Justin Seitz and Tim Arnold: https://amzn.to/3yQIdTD - Hacking Connected Cars by Alissa Knight: https://amzn.to/3G5cRN5 - Hacking: The Art of Exploitation by Jon Erickson: https://amzn.to/3ElVhTI - The Pentester Blueprint by Phillip L. Wylie and Kim Crawley: https://amzn.to/3WIoGP4 - Hacking API's by Corey J.Ball: https://amzn.to/3EfXDT5 - Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3GlG8U3 - Network basics for hackers by Occupy the Web (coming in 2023) // Videos mentioned // - Hacking Cars like Mr Robot: https://www.youtube.com/watch?v=5LvqU... - Hacking Cell phones like Mr Robot: https://youtu.be/bK1lsI-ehL8 - Nicole Perlroth: Cybersecurity and the weapons of Cyberwar: https://youtu.be/hy2G3PhGm-g - Best Hacking Python Book: https://www.youtube.com/watch?v=2B76C... - Hacking API's and Cars: You need to learn this in 2022 https://www.youtube.com/watch?v=4VaHN... - Free API Hacking Course https://www.youtube.com/watch?v=CkVvB... - Bug Bounty Bootcamp https://www.youtube.com/watch?v=QqrK2... - Top 5 hacking books with Neal Bridges: https://youtu.be/VrayWzHKVw4 // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // Occupy The Web's SOCIAL // Twitter: https://twitter.com/three_cube // OTW classes // Hacker's Arise Pro Subscription for $32.99 a month: https://hackers-arise.com/online-stor... Get 3 year's access to all live courses for $750: https://hackers-arise.com/online-stor... // Occupy The Web Website / Hackers Arise Website // Website: https://www.hackers-arise.com/?afmc=1d OTW Mr Robot series: https://www.hackers-arise.com/mr-robot hacking books hack hacker hacking python python hacking black hat python gray hat hacking linux linux for hackers bug bounty nsa nsa hacker nsa hacking ethical hacking ceh oscp ine try hack me hack the box hacking ethical hacker oscp certification ctf for beginners Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #hacking #hack #cybersecurity
LA NATIVES PODCAST! Devoted to exposing the Native hip hop talent & culture. Hosted by Zero of El Vuh. Support Podcast by visiting our MERCH store! https://lanativespodcast.creator-spring.com Every Wednesday 8PM PST https://www.youtube.com/lanativespodcast Follow us on Instagram: https://www.instagram.com/lanativespodcast Recorded @UGHHBLOG HQ in Los Angeles, CA https://lanativespodcast.com --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/la-natives/message Support this podcast: https://anchor.fm/la-natives/support
Given the past century of humans meddling with what's obviously worked perfectly for millennia, I say we failed. What's your situation's perspective on messing with what ain't broke? --- Send in a voice message: https://anchor.fm/theroc/message
https://www.counterintelligence-institute.com/ (Peter Warmka )is a former CIA agent that specialized in social engineering and "human hacking", and now uses that knowledge to help businesses assess their vulnerability to foreign intelligence groups, criminals, and other threats. Peter and https://southwestern.com/ (Southwestern) CEO Dustin Hillis discuss the biggest threats facing the nation as well as individuals and public & private companies of all sizes and how to protect yourself, and cover the next generation of targeted phishing known as “spear phishing”, deception campaigns & the role of the media, and the cybersecurity threats of the future.
Neue und dabei sehr aufschlussreiche Quartalszahlen stehen im Fokus von Agnieszka und Alexander, diesmal sehen sich die beiden den Absturz und auch gleich die Zukunft des Geschäftsmodells des Food Delivery-Unternehmens Delivery Hero genauer an, ebenso die jüngsten Ergebnisse von Uber sowie Twitter. --- » Die Themen der Folge 157: (05:28) » Quartalsergebnis von Delivery Hero und die Zukunft dieses Geschäftsmodells https://buff.ly/3Bi3jKm https://buff.ly/3HHSfs8 (11:55) » Gewinn durch kreative Kennzahlen? Ein Blick auf die jüngsten Ergebnisse von Uber https://buff.ly/3HViKuj https://buff.ly/3rNsocG (16:47) » Gewinnrückgang, aber Nutzerwachstum bei Twitter https://buff.ly/3sEmSs7 (19:48) » Peloton-CEO tritt ab, Affirm enttäuscht; Disney, Twillio und Datadog überzeugen https://buff.ly/3B79EIr https://buff.ly/3oOF5SF https://buff.ly/3oFAORo https://buff.ly/34zboOR https://buff.ly/3JJj28j (20:37) » Der Ukraine-Konflikt und Cyberwarfare-Warnungen https://buff.ly/3BjETA7 https://buff.ly/3uLAyV7 https://buff.ly/3HGbSB6 (23:55) » Bitfinex-Hack: 3,6 Milliarden Dollar in Bitcoin beschlagnahmt https://buff.ly/3HEwsS6 https://buff.ly/3Bnn1En https://buff.ly/34HjAfV https://buff.ly/3JvypRh https://buff.ly/3gHAqxH (31:30) » Melania Trumps NFT von Melania Trump bzw. Ersteller selbst gekauft https://buff.ly/3JeL4YK (33:26) » Neuer Chip von Intel verspricht spezielle Optimierung für Krypto-Mining https://buff.ly/3GH81Cd (35:27) » Deal geplatzt: Nvidia scheitert mit Übernahme von ARM https://buff.ly/3gMwb3K (37:17) » Apple plant 27 Prozent Provision für Zahlungen von Drittanbietern einzuheben https://buff.ly/3Jhmbfj https://buff.ly/3rrLAg9 (40:12) » Belgische Datenschutzbehörde: Cookie-Regelung TCF verstößt gegen DSGVO https://buff.ly/35NWTqD (42:44) » Vorsitzender der belgischen Sozialdemokraten will landesweit E-Commerce abschaffen https://buff.ly/3uKj9fw (45:01) » 100 Millionen Euro Investment für N26-Konkurrenz Vivid https://buff.ly/3GzVr7Y https://buff.ly/34yOgjz (47:49) » 30 Millionen Dollar-Finanzierungsrunde für Berliner Bauprojekt-Startup Cosuno https://buff.ly/3HTuGgi https://buff.ly/34MUkkV (49:52) » VR-Headset-Hype führt zu Anstieg von Versicherungsansprüche https://buff.ly/3swuH38 --- (51:51) » Die Buchempfehlungen der Woche: Christopher Hadnagy: “Social Engineering: The Science of Human Hacking” https://buff.ly/34Xg0xL Kevin Mitnick, William L. Simon: „Die Kunst der Täuschung. Risikofaktor Mensch” https://buff.ly/34QkTc5 --- » Weitere Infos: https://zurueckzurzukunft.creativeconstruction.de --- » Feedback, Anregungen und Wünsche an: podcast@zurueckzurzukunft.de --- » Der wöchentliche Newsletter: https://www.creativeconstruction.de/newsletter
Your weekly source for locksport news and sometimes interviews. Full show notes, including links, can be found at http://www.thelocksportscast.com In this week’s episode: OzSecCon sites down What Is Social Engineering What happened to the Ilco Key Blank Book and other interesting videos Lockpicking on Steam Speed record to 100 subs, a locksport story Padlocked Buttons in an elevator Canadian chocolate heist and other Criminal stories Sales Giveaways And more Announcements: Newpodcastapps.com The Locky Awards – Locksport Community Awards Corrections: News: What Is Social Engineering? Human Hacking in 2022 Box with combination lock, Turkish Seljuk Dynasty A.D. 1197 Fragment of a box with a combination lock, cast and hammered brass, inlaid with silver and copper Warning issued about worrying new technique used by burglars to break into homes - Manchester Evening News Community News: http://ozlockcon.com http://ozseccon.com Fichet 787 interior cylinder picked Keypicking https://twitter.com/jwrm22/status/1481739933794635789 Videos: Key Blank Book | What Happened? I turn a Stainless Bolt into a Combination Lock Self Changing Lock Setup - 4 Different Keys In 1 Lock 5 Differences Between Schlage Primus RP and Primus XP Running wheel 3 of a 4 wheel safe lock (Manipulation tip) Meetups: Products: Save 10% on Museum of Mechanics: Lockpicking on Steam https://padlockedpresents.com/ LPU Karate Belts: beltranking - lockpicking (reddit.com) Mentorship Monday 3: The Belt System 2: Breaking Rules and Getting the Belt All About The Lockpicking Belt Rankings System Speedlocks: Speedlocks.org Locksport Story: https://youtube.com/channel/UCt75XIlBBAFeFVFp_QBvxTg Locksmith Story: Lock Story: Woman freaked out after finding PADLOCKED buttons in lift sparking fears of chilling 'secret' floors Woman Finds Padlocked Buttons In Lift Sparking Fears Of Chilling 'Secret' Floors Criminals: $100K worth of chocolate stolen from Norfolk County business: OPP | CTV News Banned driver jailed after leading police on high-speed chase in stolen car | The Bolton News Sales: The Lock Sportscast Sales List https://bareboneslockpicking.com/ https://www.hooligankeys.com/ 15% off, code MAKE2022BETTER www.mattslockpit.com picks discounted on site https://www.3dlocksport.com/ 10% off. CODE: LSCAST10 https://makolocks.com/ 15% off with code BUYMAKO Unknown exp https://uklockpickers.co.uk/ 10% off with code GIFT Giveaways and Contests: Panda-Frog: #SpeedAbus (ENG-251) Lockpicking - Update Giveaway #SpeedAbus and Speedpicking the Abus 65/20 Locksport Viking: 100 Sub Giveaway! #LocksportViking100 [37] 100 Sub Giveaway! #LocksportViking100 MrBlack-Magic: #lockmagic500 [62] Giveaway! Win a Lockcam, Handmade Tools and More! #lockmagic500 Michael Gilchrist: #Norlin800 subscriber giveaway!! #Norlin800 subscriber giveaway!! CLK Supplies Introducing #Lockboss Free Giveaway! Do you work with Locks & Keys or do Locksmithing? Executive Producer: Founding Executive Producers: Panda-Frog Michael Gilchrist Starrylock WilliamsBrain Dave 2BDCy4D Liibans Locksport Journey Pat from Uncensored Tactical threeraccoonsinacoat Chirael Associate Executive Producers: Patty--cakes DoctorHogmaster Clayton Howard (Kewltune) Co-Producers: m0g Jon Lock Ratyoke MrPickur CrankyLockPicker JHPpicking Bare Bones Lock Picking Chief Content Producer: Chirael Content Producers: BandEAtoZ (Good Guy) HVLogic I fisk Jeff Moss Joshua Gonzalez Michael Gilchrist MrBlack-Magic nite0wl Panda-Frog PickSmith Pocket Women RubberBanned snow Tiger Trav Tony Virelli Xeo Zlocks.ca Special thanks to: Contact Information: Email: podcast@thelocksportscast.com Twitter https://twitter.com/charlescurrent Reddit: currentc57 on r/locksport Discord: Lockpickers United as Current, Extraordinary League of Pickers as Current, The Lock Sportscast as Current Join the Discord at http://discord.thelocksportscast.com The Lock Sportscast on Odysee Donate: http://paypal.thelocksportscast.com https://patreon.com/thelocksportscast
Ever wondered how to hack your way to more meaningful relationships? In this episode, we are talking with Robin Dreeke, best-selling author, professional speaker, former Head of the FBI and master spy recruiter. Robin's life mission has been breaking down the art of leadership, communication, and relationships, and building them into 5 steps to trust and 6 steps of who you can trust. Robin is also the founder and president of People Formula LLC, an organization that offers Advanced Rapport Building Training and Consultation. Having made his way through the ranks of the US Marines, Robin quickly realized his path to leadership was going to be a non-linear one. He learned the defining lesson that leadership is more than telling people what to do, but rather using interpersonal skills to inspire action. With this knowledge, he was recruited into the FBI where he became a counterintelligence specialist and recruited Russian spies. His fascination with human behavior eventually led him to run the FBI's elite Behavioral Analysis Program. He quickly became a Behavioral Analysis Expert, and has written 3 best-selling books and uses his expertise to train others through his online training academy. In today's episode, we discuss Robin's journey to the military and eventually the FBI, how humans are hard-wired socially, and the difference between likability and trust. We'll also talk about Robin's 6 signs of predicting human behavior and leadership mantras, how to keep our egos in check, and some of the biggest mistakes we make when trying to build new relationships. If you're looking for a deep understanding of human behavior and how to hack your way to better relationships, you do not want to miss this episode! Sponsored by - Gusto. Get three months free when you run your first payroll at gusto.com/YAP Social Media: Follow YAP on IG: www.instagram.com/youngandprofiting Reach out to Hala directly at Hala@YoungandProfiting.com Follow Hala on Linkedin: www.linkedin.com/in/htaha/ Follow Hala on Instagram: www.instagram.com/yapwithhala Follow Hala on Clubhouse: @halataha Check out our website to meet the team, view show notes and transcripts: www.youngandprofiting.com Timestamps: 01:05- Robin's Career Journey and Path to the FBI 5:28- Defining Stempathy and How it Leads to Understanding Behavior 7:27- How Humans are Hard-Wired 8:18- The Difference Between Likability and Trust 10:48- How Predictability and Trust are Related 11:39- Robin's 6 Signs of Predicting Behavior 12:58- How to Make a Connection with Anyone Through Language 14:08- Being Vulnerable and Having Genuine Conversations 16:06- How to Tell if Someone is Bored or Uncomfortable in Conversation 17:36- Showing Non-Verbal Congruence with Body Language 21:29- Building Rapport with New People 25:46- The Importance of Giving People Choice in Conversations 31:09- Ways to Keep Our Ego in Check 34:02- The Biggest Mistakes People Make When Building Relationships 35:48- How Robin Recruited Spies for the FBI 40:50- Robin's Leadership Mantras 44:35- Robin's Book The Code of Trust and His 3 Pillars of Trust 46:52- The Best Books Robin has Read Recently 49:24- Robin's Secret to Profiting in Life Mentioned In The Episode: Robin's Website: peopleformula.com Youtube: https://www.youtube.com/user/rdreeke Books Robin Recommended: -Ryan Holiday's works, Ego is Enemy, Stillness is Key, The Obstacle is the Way -Steven Pressfield, The Virtues of War, Gates of Fire -Tasha Eurich, Insight -Jay Shetty, Think Like a Monk -Jocko Willink and Leif Babin, Extreme Ownership, The Dichotomy of Leadership -Jack Schafer, The Truth Detector -Joe Navarro, Be Exceptional -Christopher J. Hadnagy and Seth Schulam, Human Hacking
TEIL 2: In dieser Folge haben wir uns mit Michael "Mike" Willer, CEO der Human Risk Consulting GmbH zum Interview verabredet. Mike ist Experte für Social Engineering und besitzt einen militärischen Background. Mit ihm spreche ich über: *Unternehmensgründung und Networking *Wie er trotz seines Wissens über SE nicht paranoid wird *Cyberkrieg und die Zukunft *Security Invesments *Typische SE Angriffe und Schutz *Herausforderungen als Unternehmer *Tipps für Unternehmer und Führungskräfte
In dieser Folge haben wir uns mit Michael "Mike" Willer, CEO der Human Risk Consulting GmbH zum Interview verabredet. Mike ist Experte für Social Engineering und besitzt einen militärischen Background. Mit ihm spreche ich über: *Unternehmensgründung und Networking *Wie er trotz seines Wissens über SE nicht paranoid wird *Cyberkrieg und die Zukunft *Security Invesments *Typische SE Angriffe und Schutz *Herausforderungen als Unternehmer *Tipps für Unternehmer und Führungskräfte
Člověk je a vždy bude tím nejslabším opatřením ve společnosti. Povíme si jak vypadá human hacking a o metodách sociálního inženýrství. Manipulace s lidskou myslí je velice účinná technika hackerů, která je často využívána nejen při phishingovém útoku. Human hacking je stále více využíván útočníky z celého světa a proto je nutné si uvědomit tuto skutečnou hrozbu.MICHAL HORÁČEK, DANIEL HEJDA, JAN PILAŘ
Welcome to I Self Reflect Podcast! -Lauriano Mercado, Founder and Creator of www.iSelfReflect.comToday's Episode is about Human Hacking. And, how you can break out of your own cycle that you probably didn't even know you were in.If you have the time please Subscribe, Like, and Share.I love and appreciate you all! Any and all feedback is greatly appreciated. I would love to hear from YOU. Follow/Comment/ShareApparel Brand Instagram : @iSelfReflectPodcast Instagram: @iSelfReflectPodcastWebsite: www.iSelfReflect.com Support the show (http://www.cash.app/$iselfreflect) --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/iselfreflect/message Support this podcast: https://anchor.fm/iselfreflect/support
Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale. This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses. Guests: Rachael Tobac: (LinkedIn), CEO of SocialProof Security Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19 George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security Notes & Resources: CSO Online article on Social Engineering OODA Loop Understanding Framing Effects More examples of Framing Effects Harvard Business Review article on the Principles of Persuasion A blog series I did on Deception (Part 1), (Part 2). PsychologyToday article on Social Engineering Recommended Books (Amazon affiliate links): The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray Social Engineering: The Science of Human Hacking by Chris Hadnagy Thinking, Fast and Slow by Daniel Kahneman. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney Music and Sound Effects by Blue Dot Sessions & Storyblocks. Artwork by Chris Machowski.
Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale. This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses. Guests: Rachael Tobac: (LinkedIn), CEO of SocialProof Security Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19 George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security Notes & Resources: CSO Online article on Social Engineering OODA Loop Understanding Framing Effects More examples of Framing Effects Harvard Business Review article on the Principles of Persuasion A blog series I did on Deception (Part 1), (Part 2). PsychologyToday article on Social Engineering Recommended Books (Amazon affiliate links): The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray Social Engineering: The Science of Human Hacking by Chris Hadnagy Thinking, Fast and Slow by Daniel Kahneman. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney Music and Sound Effects by Blue Dot Sessions & Storyblocks. Artwork by Chris Machowski.
The buzz: “Most people think of hackers as young techno-thugs who pound Moutain Dew and tap at their computers stealing data, crashing websites, or sending spam about Viagra. But there are good hackers, too, top-security professionals that governments and companies hire to protect them from the bad guys. And among these, there are a select few who don't specialize in the technical side of breaking into computers, but rather the messy, human side…fast talkers who convince unsuspecting people to let them into machines and secured physical locations. The best are so good, they not only get what they want, they make it so their targets feel better for having met them.” Human Hacking by Chris Hadnagy, 2021. Welcome to the world of social engineering or human hacking, the psychological manipulation of a person by a malicious attacker into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. Good news: Social engineering can help you regain confidence and control, become more empathetic, generous and kind. We'll ask Chris Hadnagy, Shelby Dacko, Shane McCombs and Ryan MacDougall for their take on The Future of Social Engineering: Be A Good Human Hacker – Part 2!
The buzz: “Most people think of hackers as young techno-thugs who pound Moutain Dew and tap at their computers stealing data, crashing websites, or sending spam about Viagra. But there are good hackers, too, top-security professionals that governments and companies hire to protect them from the bad guys. And among these, there are a select few who don't specialize in the technical side of breaking into computers, but rather the messy, human side…fast talkers who convince unsuspecting people to let them into machines and secured physical locations. The best are so good, they not only get what they want, they make it so their targets feel better for having met them.” Human Hacking by Chris Hadnagy, 2021. Welcome to the world of social engineering or human hacking, the psychological manipulation of a person by a malicious attacker into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. Good news: Social engineering can help you regain confidence and control, become more empathetic, generous and kind. We'll ask Chris Hadnagy, Shelby Dacko, Shane McCombs and Ryan MacDougall for their take on The Future of Social Engineering: Be A Good Human Hacker – Part 2!
“I realized that we can use human hacking skills in a positive way. How do you use it as a partner, employer, employee, a parent or as a child? How can you use these skills to get things you want out of life, while leaving people feeling better for having met you, and not being a malicious person?” - Chris Hadnagy If you’ve ever wondered how you can show up so that the person you are talking to is more receptive to what you have to say, while leaving the other person better off for your interaction with them, you’re going to love this episode. Today on Brave By Design I’m scratching my human behavior itch with one of the most renowned experts in the field of social engineering, as we talk human hacking, empathy, and influence, to name just some of the topics we cover. Chris Hadnagy is a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. He is the bestselling author of four technical books for security professionals: Social Engineering: The Art of Human Hacking; Unmasking the Social Engineer: The Human Element of Security; Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails; and Social Engineering: The Science of Human Hacking, which is now in its second edition. He is also the founder, executive director, and board member of the Innocent Lives Foundation, a nonprofit that fights the sexual abuse of children.By shifting your approach to difficult conversations and making a conscious effort to practice empathy towards the other person, you will see more great things come to you in your life. Try it, and let Chris and I know how well these techniques work for you! Connect with Chris: https://humanhackingbook.com/ Remember to hit SUBSCRIBE wherever you listen to podcasts!Are you a service-based business who wants to build your brand and get booked solid? Learn how podcasting helped Laura do that over at: podcastbrandlab.comWhat You’ll Hear In This Episode: How Chris got into the type of work he does today, and the unique occupations he’s held along the way [2:21]The way he discovered the power of social engineering and what motivated him to begin writing books on the subject [6:07]Why human hacking is so important for people to learn about [8:11]What are the key differences between influence and manipulation, and a fascinating experiment from Chris’ own life that demonstrates this [10:24]How we can begin to genuinely build more rapport with others, and what not to do [18:59]What he means when he says that we can elicit emotions in others by expressing those same emotions in ourselves [22:50]The approach Chris recommends taking when engaging someone in a difficult conversation [26:50]His thoughts on “cancel culture” and the only way that we can move forward from it [38:43]Support the show (https://www.paypal.me/bravebydesign)
The buzz: “Most people think of hackers as young techno-thugs who pound Moutain Dew and tap at their computers stealing data, crashing websites, or sending spam about Viagra. But there are good hackers, too, top-security professionals that governments and companies hire to protect them from the bad guys. And among these, there are a select few who don’t specialize in the technical side of breaking into computers, but rather the messy, human side…fast talkers who convince unsuspecting people to let them into machines and secured physical locations. The best are so good, they not only get what they want, they make it so their targets feel better for having met them.” Human Hacking by Chris Hadnagy, 2021. Welcome to the world of social engineering or human hacking, the psychological manipulation of a person by a malicious attacker into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. Good news: Social engineering can help you regain confidence and control, become more empathetic, generous and kind. We’ll ask Chris Hadnagy, Shelby Dacko, Shane McCombs and Ryan MacDougall for their take on The Future of Social Engineering: Be A Good Human Hacker – Part 2!
Throughout recorded human history, people have figured out how to use the latest “technology” to scam, con or hack others for their own benefit. William Chaloner (1650–1699): Serial counterfeiter and confidence trickster proven guilty by Sir Isaac Newton. Gregor MacGregor (1786–1845): Scottish con man who tried to attract investment and settlers for the non-existent country of Poyais. Cassie Chadwick (1857–1907): Canadian who defrauded banks out of millions by pretending to be the illegitimate daughter and heir of Andrew Carnegie. Joseph Weil (1875–1976): Chicago's infamous Yellow Kid posed as bank presidents, inventors, millionaires, and scientists. “I have played more roles in real life than the average actor ever dreamed of.” Frank Abagnale, Jr. (born 1948): U.S. check forger and impostor turned FBI consultant, who impersonated a PanAm airline pilot, a doctor, a lawyer, and a teacher to illegally make over $2.5 million. The 2002 movie Catch Me If You Can is based on his autobiography. Is there a term for this? Yup. Social engineering is the psychological manipulation of a person by a malicious attacker/s into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. It differs from a traditional “con” when it is one of many steps in a complex scheme. Social engineering techniques are based on specific attributes of human decision-making known as cognitive biases, aka “bugs in the human hardware” that are exploited to create attack techniques. Did you know that you risk being hacked when you use the forgot password function on websites that require login? An improperly secured password-recovery system can grant a malicious attacker full access to your account, and lock you out. The good news: Social engineering as a force for good can be in your future — to help you regain your confidence and control. When you use human hacking for good, you can become more empathetic, generous and kind, and leave people feeling better for having met you, says master hacker and social engineering pioneer and author Christopher Hadnagy, who is on this panel. We'll ask Chris Hadnagy, Ryan MacDougall, Maxie Reynolds and Shane McCombs for their take on The Future of Social Engineering: You As The Good Human Hacker!
Throughout recorded human history, people have figured out how to use the latest “technology” to scam, con or hack others for their own benefit. William Chaloner (1650–1699): Serial counterfeiter and confidence trickster proven guilty by Sir Isaac Newton. Gregor MacGregor (1786–1845): Scottish con man who tried to attract investment and settlers for the non-existent country of Poyais. Cassie Chadwick (1857–1907): Canadian who defrauded banks out of millions by pretending to be the illegitimate daughter and heir of Andrew Carnegie. Joseph Weil (1875–1976): Chicago's infamous Yellow Kid posed as bank presidents, inventors, millionaires, and scientists. “I have played more roles in real life than the average actor ever dreamed of.” Frank Abagnale, Jr. (born 1948): U.S. check forger and impostor turned FBI consultant, who impersonated a PanAm airline pilot, a doctor, a lawyer, and a teacher to illegally make over $2.5 million. The 2002 movie Catch Me If You Can is based on his autobiography. Is there a term for this? Yup. Social engineering is the psychological manipulation of a person by a malicious attacker/s into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. It differs from a traditional “con” when it is one of many steps in a complex scheme. Social engineering techniques are based on specific attributes of human decision-making known as cognitive biases, aka “bugs in the human hardware” that are exploited to create attack techniques. Did you know that you risk being hacked when you use the forgot password function on websites that require login? An improperly secured password-recovery system can grant a malicious attacker full access to your account, and lock you out. The good news: Social engineering as a force for good can be in your future — to help you regain your confidence and control. When you use human hacking for good, you can become more empathetic, generous and kind, and leave people feeling better for having met you, says master hacker and social engineering pioneer and author Christopher Hadnagy, who is on this panel. We'll ask Chris Hadnagy, Ryan MacDougall, Maxie Reynolds and Shane McCombs for their take on The Future of Social Engineering: You As The Good Human Hacker!
Throughout recorded human history, people have figured out how to use the latest “technology” to scam, con or hack others for their own benefit. William Chaloner (1650–1699): Serial counterfeiter and confidence trickster proven guilty by Sir Isaac Newton. Gregor MacGregor (1786–1845): Scottish con man who tried to attract investment and settlers for the non-existent country of Poyais. Cassie Chadwick (1857–1907): Canadian who defrauded banks out of millions by pretending to be the illegitimate daughter and heir of Andrew Carnegie. Joseph Weil (1875–1976): Chicago’s infamous Yellow Kid posed as bank presidents, inventors, millionaires, and scientists. “I have played more roles in real life than the average actor ever dreamed of.” Frank Abagnale, Jr. (born 1948): U.S. check forger and impostor turned FBI consultant, who impersonated a PanAm airline pilot, a doctor, a lawyer, and a teacher to illegally make over $2.5 million. The 2002 movie Catch Me If You Can is based on his autobiography. Is there a term for this? Yup. Social engineering is the psychological manipulation of a person by a malicious attacker/s into performing actions or divulging confidential information for the purpose of information gathering, fraud, or system access. It differs from a traditional “con” when it is one of many steps in a complex scheme. Social engineering techniques are based on specific attributes of human decision-making known as cognitive biases, aka “bugs in the human hardware” that are exploited to create attack techniques. Did you know that you risk being hacked when you use the forgot password function on websites that require login? An improperly secured password-recovery system can grant a malicious attacker full access to your account, and lock you out. The good news: Social engineering as a force for good can be in your future — to help you regain your confidence and control. When you use human hacking for good, you can become more empathetic, generous and kind, and leave people feeling better for having met you, says master hacker and social engineering pioneer and author Christopher Hadnagy, who is on this panel. We’ll ask Chris Hadnagy, Ryan MacDougall, Maxie Reynolds and Shane McCombs for their take on The Future of Social Engineering: You As The Good Human Hacker!
Bill Horan talks with Christopher Hadnagy, author of HUMAN HACKING. Chris will discuss what he means by human hacking, how understanding the way humans are hacked can help you avoid this, why empathy is so important and the four basic questions we must ask.ourselves.
Peter will tell the story behind the story of his new book "Confessions of a CIA Spy - The Art of Human Hacking" including key highlights from the book regarding data protection. Peter's new book is available on Amazon: https://amazon.com Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw684
This week, we welcome Peter Warmka the founder of the Counterintelligence Institute and author of the newly released new book titled: "Confessions of a CIA Spy - The Art of Human Hacking"! Senior Security Architect Bryan Seely from Cyemptive Technologies joins us to discuss How to be a CyberSecurity Hero! In the Security News Nvidia tries to throttle cryptocurrency mining, Digging deeper into the Solarwinds breach, now with executive orders, NASA's secret message on Mars, vulnerabilities in Python and Node.js, hacking TVs and AV gear, nation state hacking galore, patch your VMWare vCenter, and is a password manager worth your money?! Show Notes: https://securityweekly.com/psw684 Peter's new book is available on Amazon: https://amazon.com Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Peter Warmka the founder of the Counterintelligence Institute and author of the newly released new book titled: "Confessions of a CIA Spy - The Art of Human Hacking"! Senior Security Architect Bryan Seely from Cyemptive Technologies joins us to discuss How to be a CyberSecurity Hero! In the Security News Nvidia tries to throttle cryptocurrency mining, Digging deeper into the Solarwinds breach, now with executive orders, NASA's secret message on Mars, vulnerabilities in Python and Node.js, hacking TVs and AV gear, nation state hacking galore, patch your VMWare vCenter, and is a password manager worth your money?! Show Notes: https://securityweekly.com/psw684 Peter's new book is available on Amazon: https://amazon.com Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Peter will tell the story behind the story of his new book "Confessions of a CIA Spy - The Art of Human Hacking" including key highlights from the book regarding data protection. Peter's new book is available on Amazon: https://amazon.com Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw684
What is human hacking and how can it make you a better parent? Today Andy welcomes Chris Hadnagy, social engineer extraordinaire to the show to share how we can communicate better at home and in life. For more on Chris Hadnagy: https://www.social-engineer.com/ Free Tools from The Secure Dad: https://www.thesecuredad.com/tools
How do you improve your social experiences? How do you improve your communication? How do you win friends, influence people, and leave them better off for having met you? In this episode of Negotiations Ninja, Chris Hadnagy—a professional social engineer—shares the framework he created to do just that. If you’re striving to use your influence for the good of others, this is a can’t-miss episode. Outline of This Episode [1:53] From adversarial simulator to human hacker [4:42] The apprehensiveness toward communication [7:56] What additional tools do we need? [11:15] You can’t teach what you haven’t tested [19:40] Overcoming the fear of being manipulated [22:42] How to ask, “Is this safe for me?” [27:17] The Amygdala's role in the emotional landscape [31:23] How to connect with Chris + learn more Resources & People Mentioned How to Win Friends and Influence People Connect with Chris Hadnagy Human Hacking Book Human Hacking on Amazon The Human Hacking Conference Follow on Twitter Connect on LinkedIn Connect With Mark Follow Negotiations Ninja on Twitter: @NegotiationPod Connect with Mark on LinkedIn Follow Negotiations Ninja on LinkedIn Connect on Instagram: @NegotiationPod Subscribe to Negotiations Ninja
Top 5 ethical hacking books to get started? Top 5 practical hacking books? Neal discusses Hacking and cybersecurity books with me. Do you agree with him? Did we miss any great books? Menu: Top hacking books for 2021: 0:00 Top 5 books to get started in cybersecurity: 0:28 Book 1: The Pentest Blueprint: 1:00 Book 2: Social Engineering - The Art fo Human Hacking: 1:58 Real world example from Neal's experience: 3:03 Social engineering vs technical hacking skills: 6:34 Some people wouldn't want to lie: 10:12 What's good in the book - defeating humans: 10:50 Book 3: Basic Security Testing with Kali Linux: 12:22 Teaching you tools / OSCP: 13:42 Book 4: Metasploit Penetration Testing Cookbook: 14:27 Cost of training: 16:05 Book 5: The Hacker Playbook: 16:37 How do I practice ethical hacking? 18:27 Buying physical equipment: 20:06 Practical Book 1: RTFM: 22:00 Practical Book 2: BLue Team Handbook: 23:46 Practical Book 3: Gray Hat Python: 24:51 Practical Book 4: Malware Analysts Cookbook: 26:40 Practical Book 5: Inside Cyber Warfare: 35:16 Top 3 books: 37:07 Top 1: 37:28 Top 2: 37:40 Top 3: 38:05 Stream mentioned: https://www.youtube.com/watch?v=iBj_m... =============================== Books (Amazon Affiliate links): =============================== The Pentester BluePrint: Starting a Career as an Ethical Hacker: https://amzn.to/3rzZ9Hw Inside Cyber Warfare: https://amzn.to/2YZUcvn The Hacker Playbook: 1: https://amzn.to/36XrM9I 2: https://amzn.to/36Sr2mj 3: https://amzn.to/3rzYxSe Metasploit Penetration Testing Cookbook: 2nd Edition: https://amzn.to/2MO2WCk 3rd Edition: https://amzn.to/3jyZgQH Social Engineering - The Art of Human Hacking: https://amzn.to/3aMZsIm Basic Security Testing with Kali Linux: https://amzn.to/3cWLAOc Malware Analysts Cookbook: https://amzn.to/3cSlxb7 Gray Hat Python: https://amzn.to/2Z2wiPK BLue Team Handbook: https://amzn.to/3tHq6uM Red Team Field Manual (RTFM): https://amzn.to/2LzzSOh =================================== ISBN Numbers from Neal's bookshelf: =================================== Inside Cyber Warfare: 978-0-596-800215-8 The Hacker Playbook: 978-1-4949-3263-3 Metasploit Penetration Testing Cookbook: 978-1-84951-742-3 Social Engineering - The Art fo Human Hacking: 978-0-470-63953-5 Basic Security Testing with Kali Linux: 9781-494861278 Malware Analysts Cookbook: 978-0-470-61303-0 Gray Hat Python: 978-1-59327-192-3 Blue Team Handbook: 9781500734756 Red Team Field Manual: 9781494295509 ================ Links: ================ INE Free training: https://ine.com/pages/cybersecurity eLearn Security: https://elearnsecurity.com/product/ej... OSCP: https://www.offensive-security.com/co... SANS: https://www.sans.org/ Hack the box: https://www.hackthebox.eu/ Try Hack Me: https://tryhackme.com/ CTF Time: https://ctftime.org/ctf-wtf/ CEH: https://www.eccouncil.org/programs/ce... Cyber Blue: https://securityblue.team/ Cyber Defenders: https://cyberdefenders.org/ ================ Connect with Neal: ================ LinkedIn: https://www.linkedin.com/in/nealbridges/ Twitter: https://twitter.com/ITJunkie Twitch: https://www.twitch.tv/cyber_insecurity ================ Connect with me: ================ Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal ================ Support me: ================ DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Udemy CCNA Course: https://bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10
Interview With Peter Warmka Confessions of a CIA Spy - The Art of Human Hacking Interview with Peter Warmka #Author #PeterWarmka #ConfessionsOfaCIASpy Hi, and welcome to the show! On today's call, I have the pleasure of spending time with AUTHOR and founder and CEO at Counter Intelligence Institute Peter Warmka talking about his new book “Confessions of a CIA Spy, The Art of Human Hacking”. For context, Peter is a former Senior Intelligence Officer with the CIA who would successfully breach the security of target organizations overseas as part of his role. During this content-rich call, Peter shares how his book came about, and shares some real-life experiences that you will find both insightful and eye-opening. A call not to miss if you own a business. When you read Confessions of a CIA Spy, you will see how easy it is for individuals and organizations become targets, how information is collected on them through social media and other resources, and some of the elicitation techniques used against them for additional information collection. Peter also shares examples of how information that is gathered is then utilized to design the actual social engineering approach to breach security via e-mail (spear phishing), SMS (smishing), telephonic (Vishing using spoof calling), face-to-face interaction and so much more. With this book, you will get a clearer understanding of the ever-present threats, and how Peter's organization Counter Intelligence Institute, can help you defend yourself against attempted security breaches that can result in theft of proprietary information and personal data. To get your cop of Confessions of a CIA Spy, click on the link below…
"You have to be vigilant in being observational". In this interview with Chris Hadnagy, founder and CEO of Social-Engineer, LLC , we discussed the need for frontline personnel to find the right balanced approach between friendly customer service and a vigilant challenging culture. We also discussed the importance of ego suspension in interactions and Chris shared some great takeaways on pretext development and observations that occur during interactions.
Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. Chris is also a well-known author, having written five books on social engineering. He also lectures and teaches about social engineering around the globe. Moreover, he's been invited to speak at the Pentagon, as well as other high secure facilities. Additionally, as the creator of the world's first Social Engineering Capture the Flag (SECTF), Chris leads the way in educating people on this serious threat. Chris works with some of the world's leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers. Links; https://humanhackingbook.com/ https://www.humanhackingconference.com/
When we think of hacking, we think of a tech-savvy dude breaking into computer systems to steal data. But hackers can also take the form of "social engineers" who get what they want by building rapport and penetrating psychological defenses. My guest is an expert and pioneer in the area of human hacking, and shows individuals and companies the weaknesses of their security systems by breaking into their offices and computers, not by bypassing pass codes and firewalls, but simply by walking in the front door, and knowing how to ask for and receive access from the humans who run the show His name is Chris Hadnagy, and he's the author of Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You, which takes the social engineering principles con men and malicious social hackers use to breach security systems and steal data, and shows the average person how to use them for positive ends in their personal and professional relationships. Today on the show, Chris shares how assessing which of four styles of communication someone prefers can help you better connect with them, why you should approach every interaction knowing your pretext, the keys for building rapport, and the difference between manipulation and influence. We end our conversation with tips on the art of elicitation -- how to get information from someone without directly asking for it. See omnystudio.com/listener for privacy information.
Human Hacking | Returning to Sports | Embracing Age | Mini Book Club | National Blood Donor Month
Social Engineer Chris Hadnagy visits Fraud Busting. His specialty is the human side of security. You’ll be amazed at his stories of breaking into companies (at their request) to test their security. And we’ll chat about how to use the tools of persuasion that the bad guys use to make the world a better place so you win friends, influence people and leave them better off for having met you. His new book Human Hacking is hot off the presses. You’re gonna want to make sure you get a copy of it.
This week Chris Hadnagy joins us to talk about the psychology behind social engineering, choosing effective pretexts, as well as the science behind how we make decisions. My 3 main takeaways were 1) how to identify personality types and communicate effectively using DISC 2) how Oxytocin and Amygdala hijacking influence our behavior and 3) How to get started in a career as a social engineer For more information, including the show notes check out https://breachsense.io/podcast
In this special episode, Chris Hadnagy joins Maxie Reynolds to talk about the amazing stories and useful lessons contained in Chris’s new book: “Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You”. Listen as Chris delves into the process of making “Human Hacking” and shares the awesome story behind its inception. Maxie and Chris also discuss the importance of empathy especially when it comes to hacking humans. Chris a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. 00:09 – Introduction to Maxie Reynolds 02:13 – Introduction to Christopher Hadnagy’s brand-new book: “Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You” 02:51 – Human-hacking is a skill that can be used in everyday life by everyday people 04:19 – What it means to “Leave Them Better Off for Having Met You” 05:50 – “The martial art of the mind” and how a malicious person could use it for harm 07:39 – Empathy and why it is so important when hacking humans 09:21 – Showing empathy while amygdala hijacked 11:40 – Empathy is more than just putting yourself in someone else’s shoes 14:15 – Empathy is often hierarchical 16:33 – The power of “I’m sorry” 18:02 – Why understanding the meaning behind someone’s actions is so important 21:48 – Accuracy of the stories told in the book 24:15 – The process of co-authoring the book with Seth Schulman 26:43 – The amazing story of how the book came to be 31:16 – How to fight the isolation and social awkwardness brought by technology and, more recently, COVID-19. 34:46 – Giving your feedback on the book 36:20 – A distillation of the “Advanced Practical Social Engineering” course, made applicable to everyone 40:50 – Socially engineering the world’s best rock band 43:51 - “Quick Fire Questions”: 44:04 – Chris's favorite story in the book 45:04 – Is there a stage in child development where less empathy is shown? 46:10 – Would the new book have helped teenage Chris? 48:01 – Is it as nicer to feel empathy yourself or receive it from someone else? 49:49 – Balance is required when teaching empathy. 51:19 – How we can all better our communities by learning to “Win Friends, Influence People, and Leave Them Better Off for Having Met You” 53:35 – Chris's book recommendations Without Conscience: The Disturbing World of the Psychopaths Among Us Antifragile: Things That Gain from Disorder The Dictionary of Body Language: A Field Guide to Human Behavior 54:56 – Outro Human Hacking Book Website Human Hacking Book Amazon Maxie on Twitter Chris on Twitter Social-Engineer on Twitter SEVillage: The Human Hacking Conference Social-Engineer.org Social-Engineer.com The Innocent Lives Foundation Clutch
In deze aflevering hebben we het over social engineering naar aanleiding van het boek "Social Engineering: The Science of Human Hacking"
Lisa interviews Chris Hadnagy, founder and CEO of Social-Engineer LLC, aka “The Human Hacker”. This week on Rebooting... •Tales of how social engineering is used in corporate/industrial espionage. • The hazards of being a social engineer and how some pretexts fail in very unexpected ways. • Hear about how his daughter once described his career. •The new wave of romance frauds hitting the world. • His new non-profit hunting online predators for law enforcement. • Much much more.. Like and subscribe to ensure you don't miss an episode ►►►SUBSCRIBE! ►►► https://www.youtube.com/channel/UCaj1V0ptRrMDucohq41LDmg?sub_confirmation=1 ►►Get it as a PODCAST ►► https://anchor.fm/rebooting https://podcasts.apple.com/gb/podcast/rebooting-with-lisa-forte/id1520180332 ►►https://www.social-engineer.com/ ►►https://www.innocentlivesfoundation.org/ ►►https://twitter.com/humanhacker ►►https://www.linkedin.com/in/christopherhadnagy/ ►►Books: Chris is also the best-selling author of four books; Social Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security, Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails, and Social Engineering: The Science of Human Hacking, 2nd Edition. https://www.amazon.co.uk/Christopher-Hadnagy/e/B004D1T9F4/ref=dp_byline_cont_pop_book_1
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, security consultant and master social engineer, Christopher Hadnagy, joins us to share his stories and wisdom. He describes what it was like to be a social engineer before the world knew what social engineering was and tells some of his amazing stories from his long career in penetration testing. A big thanks to Christopher Hadnagy from social-engineer.org for sharing his stories with us. Check out his book Social Engineering: The Science of Human Hacking, affiliate link here. Check out his podcast called The Social-Engineer podcast. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from LastPass. LastPass is a great password manager but it can do so much more. It can setup 2FA for your company, or use it to monitor what your users are doing in the network. Visit LastPass.com/Darknet to start your 14 day free trial. Sources https://www.social-engineer.org/ How phishing scammers manipulate your amygdala and oxytocin TEDxFultonStreet DEF CON 22 - Chris Hadnagy - What Your Body Tells Me - Body Language for the SE https://en.wikipedia.org/wiki/George_C._Parker Book Recommendations with affiliate links: Social Engineering Influence What Every Body is Saying Emotions Revealed Presence It’s Not About “Me”, Top 10 Techniques for Building Rapport Learn more about your ad choices. Visit megaphone.fm/adchoices
O meu papo hoje foi sobre Engenharia Social com a Marina Ciavatta, que é Social Engineer na Blackbot, e com Anderson Tamborim, que é Consultor em Investigação Científica de Fraudes em Ambiente Corporativo. Será que é realmente possível hackear humanos? Tirar informações confidenciais em apenas 5 minutos, ter acesso a lugares proibidos utilizando apenas empatia. Ouça e confira! --- Send in a voice message: https://anchor.fm/renato-braga/message
Chris possesses over 17 years of experience as a practitioner and researcher in the security field. He is the author of 3 (soon to be 4) books as well as 3 different training courses taught around the globe. Chris has trained and taught various branches of the US Government in the art and science of social engineering, including the FBI, SOCOM and others. Chris has been invited to the Pentagon to debrief 30+ general officers and government officials on social engineering and its effect on the United States. Chris established the world’s first social engineering penetration testing framework at www.social-engineer.org, providing an invaluable repository of information for security professionals and enthusiasts. That site grew into a dynamic web resource including a podcast and newsletter, which have become staples in the security industry and are referenced by large organizations around the world. Chris specializes in understanding how malicious attackers exploit human communication and trust to obtain access to information and resources through manipulation and deceit. His goal is to secure companies by educating them on the methods used by attackers, identifying vulnerabilities, and mitigating issues through appropriate levels of awareness and security. Chris' links Web: https://www.social-engineer.org Twitter: https://www.twitter.com/humanhacker Instagram: https://www.instagram.com/socialengineerllc/ And don’t forget to support the podcast by subscribing for free, reviewing, and sharing. New Livestream https://youtube.com/erichunley Web: https://unstructuredpod.com/ Twitter: https://twitter.com/unstructuredp Facebook: https://facebook.com/unstructuredp Instagram: https://instagram.com/unstructuredp Join the Facebook group: fb.com/groups/unstructured
This week we get into the wave that is Tekashi69 and what he did this week and how we felt about it all. We also talked about Boosie Badazz and his comments about getting his son some head at a real young age. And so much more some come join in on the conversations.★ Support this podcast on Patreon ★
Christopher Hadnagy je jedan od pionira socijalnog inženjeringa – skupa metoda i alata koji su razvijeni specifično da potaknu ljude da naprave nešto što inače ne bi, bilo u dobre ili loše svrhe. Specifično, ovo područje je nastalo iz računalne (informatičke) sigurnosti, gdje su rani hakeri kao Christopher iskorištavali nove mogućnosti u komunikaciji elektroničkim sredstvima, te povjerenje i nesnalaženje u istima od strane korisnika, da bi dolazili do inače povjerljivih informacija ili lokacija. Kasnije se ovo područje razvilo u cjelokupan set usluga i alata koji se u pozitivne svrhe koristi kada korporacije žele testirati koliko su otporne na napade koji uključuju iskorištavenje njihovih djelatnika. Christopher je kreirao prvu zaokruženu edukaciju o ovome, autor je knjiga Social-Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security, Phishing Dark Waters, te Social Engineering: The Science of Human Hacking. Uz lektiru možete pogledati ili poslušati podcast epizodu s Christopherom Hadnagyem: https://www.youtube.com/watch?v=BN4W90IrYKQ&t=9s Povezani sadržaj: E039 – Alen Delić – Certificirani društveni inženjer E095 – Christopher Hadnagy – Chief human hacker E096 – Saša i Ivan – Specijalna epizoda – SAD, planovi, nove ideje L001 – Surove Strasti lektira: Utjecajnost // Robert Cialdini L011 – Surove Strasti lektira: Predictably Irrational // Dan Ariely L028 – Lektira: Never Split the Difference // Chris Voss Sve lektire Surovih Strasti nalaze se OVDJE. Pišite feedback, Saša Tenodi PREPORUKE ZA LAKŠE I UGODNIJE SLUŠANJE SUROVIH STRASTI: Tri načina kako slušati podcastKako slušati podcast u autu koji nema Mp3 playerTop lista najslušanijih epizoda
This week on CWCM I sit down with a human teacher and student. RA of Earth specialises in personal development and ultimate freedom through the practice of mindfulness, movement and Kriya's. He terms himself the 'bringer of dawn' and is also the founder of Kriya of the Week and Practice of the Day. What we cover in the episode:Powering ourselves through the energy of the sunHow our body is so complex and resembles technologyThe teacher/student relationship and guru/discipleTelecommunicationsOur level of consciousnessCells have consciousnessA lot of positivity has come from the internetOur heart has a brainCommunicating outside of your body without wordsHow the army is using empathy training to become more efficientIntuition is really presenceWe are creators and all that will be is your state of being.Reality is your perceptionSteps to become more awareResources:Dr Joe DispenzaGuru SinghRA of Earth Instagram
Episode Highlights: The Human Hacking Conference was about having a deep understanding of other human beings to help you make connections. Robin Dreeke’s presentation was about his code of trust and sizing people up with a step-by-step process. Next year he will do what he did this year but then go into sizing people up. Paul Wilson’s presentation was about how there’s a vast toolbox of manipulation that is untapped in the security community. People were supposed to walk away from Dov’s session with a sense of their own dragon fire. Stephanie Paul’s session was about helping people find their voice and their message from the inside out. She believes the conference ended up with a theme because they're all humans speaking to human qualities that we have. As they discuss why the conference had a theme, Paul asserts that the core element is story. The subject itself fed the experience of the weekend. Next year, Stephanie's session will be about learning through fun. Dov’s session next year will help you better understand your own emotional logic. Paul’s session next year will give people a toolkit for recognizing deception. 3 Key Points: The Human Hacker Conference was all about helping people understand themselves and others. Common themes emerged because presenters were speaking to the human qualities we all possess. Story can be used to teach, to educate, to touch hearts and it can also be used against you. Resources Mentioned: Robin Dreeke website Dov Baron website Stephanie Paul website R. Paul Wilson website Sizing People Up (book) Emotional Intelligence (book) The Why Guide to Story Hacking (Use code HACK4U for a special discount) Social-engineer.org Social-engineer.com Innocent Lives Foundation Human Hacker Twitter SE Village Twitter
Human Hacker, author and business man Chris Hadnagy is one and all. His training is awesome and the only way you can get to his chicken is to stump up some cash. I had the privilege of training with Chris and enjoyed interviewing him. Find out what surprises he has in store for everyone. To find out more about his books go to the link below https://amzn.to/2OvkKzP His website and training can be accessed here https://www.social-engineer.com/social-engineering-training/
Christopher Hadnagy is a Chief Human Hacker, professional Social Engineer, author of 4 books, and keynote speaker. He’s the CEO of Social‐Engineer, LLC, a company who serves some of the globe’s largest organizations. Additionally, Chris provides free resources, including the world’s first Social Engineering Framework, via Social-Engineer.Org, and heads the Innocent Lives Foundation, a 501(c)(3) that unmasks anonymous child predators.Chris's Links:WebsiteTedX TalkHuman Hacking ConferenceChris's PodcastLinkedIn TwitterBook recommendations & Author Links:Amy CuddyJoe Navarro Robin Dreeke Ellen Langer Chris Voss
When you hear the term “social hacking” you might think of a covert, manipulative way of prying into someone’s life. That’s not at all what we’re talking about when we apply the term to negotiation. Social hacking is an approach to information gathering that comes from the discipline known as “Social Engineering.” That's a field that my guest, Chris Hadnagy has become known for. Chris is the CEO, Founder, and Chief Human Hacker of Social-Engineering, LLC, and author of the phenomenal book, “Social Engineering: The Art of Human Hacking.” In this conversation, you’re going to learn what social engineering really is, why it doesn’t have to be a negative thing, and how to use its techniques to gather information and gain a competitive advantage that leads to success in your negotiation and procurement responsibilities. Outline of This Episode [0:36] Why you’ll enjoy this insightful and provoking conversation with Chris [1:30] How Chris moved into this realm and what he means by the term “Social Engineering” [3:53] Could you walk into a cafe and gain information by what you see? [8:27] Three things to master in order to become a master of conversation [13:49] What is preloading and how does it work? [17:07] How to verify information through deliberate false statements [21:00] Maintain the relationships you’ve allowed to wane through instant rapport Resources & People Mentioned BOOK: Social Engineering SPONSOR: ProcureCon West: Use the code “PIW19NN” Connect with Chris Hadnagy Follow Chris on LinkedIn Follow Chris on Twitter: @HumanHacker Chris’ company Social-Engineer Social-Engineer on LinkedIn Social-Engineer on Twitter: @SocEngineerInc Connect With Mark Follow Negotiations Ninja on Twitter: @NegotiationPod Connect with Mark on LinkedIn Follow Negotiations Ninja on LinkedIn Connect on Instagram: @NegotiationPod Subscribe to Negotiations Ninja
Hrvatski: Christopher Hadnagy je jedan od pionira socijalnog inženjeringa - skupa metoda i alata koji su razvijeni specifično da potaknu ljude da naprave nešto što inače ne bi, bilo u dobre ili loše svrhe. Specifično, ovo područje je nastalo iz računalne (informatičke) sigurnosti, gdje su rani hakeri kao Christopher iskorištavali nove mogućnosti u komunikaciji elektroničkim sredstvima, te povjerenje i nesnalaženje u istima od strane korisnika, da bi dolazili do inače povjerljivih informacija ili lokacija. Kasnije se ovo područje razvilo u cjel0kupan set usluga i alata koji se u pozitivne svrhe koristi kada korporacije žele testirati koliko su otporne na napade koji uključuju iskorištavenje njihovih djelatnika. Christopher je kreirao prvu zaokruženu edukaciju o ovome, autor je knjiga Social-Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security, Phishing Dark Waters, te Social Engineering: The Science of Human Hacking. S gostom ove epizode je razgovarao Saša dok je polazio upravo opisanu edukaciju u SAD-u. English: Christopher Hadnagy is one of social engineering pioneers. This is a set of methods and tools developed specifically to induce people into doing an action they otherwise wouldn't - for better or for worse. Specifically, this field is an offshoot of IT security, where early hackers such as Christopher have exploited new opportunities in electronic communications technologies, the combination of users' trust and confusion with them, to gain access to confidential information and locations. Social engineering has later been developed into a comprehensive set of services and tools which are being used by the good guys when corporations wish to test their resilience to security attacks which involve exploiting their workforce. Christopher is the creator of the first all-around training course on the subject, and has authored several books: Social-Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security, Phishing Dark Waters, te Social Engineering: The Science of Human Hacking. This interview was conducted by Sascha while attending the Advanced Practical Social Engineering Training course with Christopher in Orlando, Florida. https://www.youtube.com/watch?v=BN4W90IrYKQ Teme razgovora: 00:45 - Saša: Chris likes me! 01:15 - Chris is a famous name in social engineering 02:00 - When did the term 'social engineering' come to you 03:20 - I have a specific set of skills... 05:00 - 'Well... I'll run your business for you!' 07:30 - A weird path led me to figure out what my skills are 08:20 - I get bored really fast. When there is no more challenge or opportunity to learn - I'm done. 10:51 - Everything is learnable if you have the right motivation and a right teacher 12:30 - Little goals in conversations with people in everyday life 13:25 - Is social engineering good or bad? 14:30 - I focus my business on influence 16:30 - Where does the term 'social engineering' come from? 17:30 - Emotions disables the rational centres - and this is when I try to make an influence 19:00 - Access the network through the building and through the people 20:45 - It feels good when you change someone's perception and they feel good and proud about it 22:15 - Experiences with writing books 24:30 - There is always going to be people that love you and there is always going to be people that hate you - interact with both and take most out of it 27:00 - Someone does something amazing even though they are nervous with it every time 28:50 - If I find people falling for phishing emails, the company must agree in advance not to fire them 30:30 - It's better to praise the good ones and train the bad ones than it is to shame the bad ones and do nothing for the good ones 31:30 - There must be ethics in social engineering 33:30 - We build relationships with our clients
How to Become a Social Engineer Apply Social Engineering Tactics to Your Sales & Marketing How to Be Aware That You Are Being Socially Hacked Security By Education 4 Main Vectors of Attacks Protect Your Business On a Budget: Hotels, Restaurants, Medical Practice Social Media Awareness
What’s this about human hacking, you ask? Yes, while there are scenarios where people are indeed inserting and injecting technology under their skin and into their bodies—this is called “biohacking”—that’s not what we are talking about here. Rather, this is about the psychological hacking of one’s mind to change the way they think about something, to change the way they approach a particular situation, or to flat-out get them to trust someone that is untrustworthy. Everyone is susceptible to this at some level. Think you’re not? Lucky you (but really, you are, sorry). Even if you think you aren’t at risk personally, your employees and business partners certainly are. YOUR EDUCATORS - Masha Sedova, Co-Founder, Elevate Security - James Stanger, Chief Technology Evangelist , CompTIA - Rachel Tobac, CEO, SocialProof Security YOUR MODERATORS - Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine - Marco Ciappelli, Co-Founder, ITSPmagazine Join us for this need-to-know webcast to learn: - How social engineering and human hacking works - The potential impact social engineering can have on a business - How to spot a social engineering attack - Ways to train your staff so they don’t fall victim The complete series of webcasts, podcasts, articles, and supporting material can be found on ITSPmagazine at: https://itspmagazine.com/cybersecurity-for-small-medium-business Enjoy, get involved, and share!
This month's book is Social Engineering: The Art of Human Hacking. Brian Trippe and Mike Kelley sit down and dissect this powerful book on influence and persuasion. Book of the month for December is The One Sentence Persuasion Course by Blair Warren. This is an e-book and audio book only. There are no hard copies available. You can get the e-book here: https://www.amazon.com/One-Sentence-Persuasion-Course-Bidding-ebook/dp/B00AAF5GJK
Insecure - Cyber Security Podcast With Keith Wilson and John Morton
The return of John Morton... That's right, he's back from Mortoning around and he's talking Mac Security. Keith and John also discuss topics like Next Gen Bio Security, The future of hacking humans, and IoT.Episode Links:Objective by the SeaClosing Music:The Animal In Me's cover of "Your Love" originally by The OutfieldGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.
This is the 80th episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was hosted by Tom Eston and Scott Wright recorded September 5, 2018. Listen to this episode and previous ones direct via your web browser by clicking here! This podcast […] The post Episode 80 – Special Guest Chris Hadnagy and Social Engineering The Science of Human Hacking appeared first on The Shared Security Show.
Christopher Hadnagy Interview: Origin story connoisseur of moonshine Social Engineering: The Science of Human Hacking 2nd Edition Sponsored Link (paperback on Amazon): https://amzn.to/2NKxLD9 SEORG book list: https://www.social-engineer.org/resources/seorg-book-list/ Chris’ Podcast: https://www.social-engineer.org/podcast/ SECTF at Derby (contestants are chosen) Remembering - attention to detail Remembering details Can be the difference between success and failure Social Engineering - the different aspects: Info Gathering Time constraints Accommodating non-verbals Body language must match mood Using a slower rate of speech Suspending ego RSVP Rapport Psychology “Getting information without asking for it” Elicitation ‘The Dark Art’ -negative outcome for the target Manipulation “Getting someone to do what you want them to do” Understanding the science of compliance Influence Profiling Communications Modeling Facial Expressions Body Language Don’t overextend your reach Knowledge that comes from a point of truth, or is easily faked Pretexting Emotional Hijacking Misdirection Art Science Questions: What precipitated the need to write another book? You bring up several successful operations, and several failures… How do you regroup from a failure, especially if the point of entry is someone that ‘got you’... “The level of the assistance you request must be equal to the level of rapport you have built” - Seems like understanding this is an acquired skill, not set in stone… Many of us in the infosec world are introverts… how do you suggest we hone our skills in building rapport without coming off as creepy? Work place? On the commute? Does being an introvert mean that it might take longer to get to the goal? Can we use our introverted natures to our advantage? Get Ryan on the show… Lots of items (8 principles of influence) Typical daily SE activities Holding a door open, then the person reciprocates Framing We don’t ‘kill our dogs’, we ‘put them to sleep’. Questions from our Slack: Ben: Do you feel there's an importance for non-InfoSec adjacent folks to learn about Social Engineering, and maybe go through some sort of training in order to navigate day-to-day life in the modern world? What does an interview at Chris’ company look like? https://www.innocentlivesfoundation.org/ Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
It might not come as a shock to you that we here at SEORG love Neil Fallon and Clutch. Having Neil out at DEF CON was an amazing experience. After 4 long days at DEF CON we hosted our annual live podcast for Episode 108. Join us as: Neil fixes Chris' technical issues. We discuss ways to improve the SEVillage We talk about professional SE work and we suffer through our final sleep deprived moments in Vegas.... You can follow Neil on Twitter at: @npfallon Check out Chris' latest book: Social Engineering: The SCIENCE of Human Hacking
Kevin Mitnick, jedan od najpoznatijih društvenih inženjera na svijetu, popularizirao je termin „socijalni inženjering“. Kevin je smatrao da je znatno lakše utjecati na čovjeka da vam sam izdiktira lozinku za ulazak u određeni sustav nego hakirati isti sustav. U ovoj epizodi Surovih Strasti razgovarali smo s Alenom Delićem, višim konzultantom za informacijsku sigurnost i prvim certificiranim društvenim inženjerom u regiji. S Alenom smo razgovarali o sljedećim temama: Što je to točno društveni inženjering? Je li društveni inženjering manipulacija? Primjerima negacije u cilju izazivanja ranjivosti/responsa. Društvenom inženjeringu kao zanimanju. Zašto su ljudi dobra meta u odnosu na računala? Sigurnosnoj paranoji (i samoprocjeni paranoje) Što edukacija za društvenog inženjera podrazumijeva - Može li "SI edukacija" promijeniti osobnost? Iz kojeg je razloga Alen upisao edukaciju za društvenog inženjera? Koji su kriterij da netko postane dobar društveni inženjer? Mogu li glumci biti dobri društveni inženjeri? Kako izgleda team društvenih inženjera? Kako izgleda napad društvenih inženjera? Koje ishode imaju klijenti koji „unajmljuju“ usluge društvenih inženjera? Kreiranju scenarija za napad društvenih inženjera. Koje uloge/profesije su najčešće dio scenarija napada socijalnih inženjera? Koliko su u društvenom inženjeringu važne vještine upravljanja vlastitim emocijama? Kakva je (moguća) budućnost za društvene inženjere kao profesiju? Za daljnje istraživanje Alen preporučuje: Kevin D. Mitnick: The Art of Deception: Controlling the Human Element of Security Christopher Hadnagy: Social Engineering: The Art of Human Hacking
We'll be covering a wide range of topics from GDPR, Data Breaches, Security Design, Human Hacking, his own podcast and much more!
We'll be covering a wide range of topics from GDPR, Data Breaches, Security Design, Human Hacking, his own podcast and much more!
In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from the CyberWire and Joe Carrigan from the Johns Hopkins University Information Security Institute discuss noteworthy social engineering schemes and ways to detect them. Author Christopher Hadnagy discusses his book The Art of Human Hacking. Thanks to our show sponsor KnowBe4.
In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from the CyberWire and Joe Carrigan from the Johns Hopkins University Information Security Institute discuss noteworthy social engineering schemes and ways to detect them. Author Christopher Hadnagy discusses his book The Art of Human Hacking.
Today's Flash Back Friday comes from Episode 111, October 2012. We have all had the experience of being taken advantage of at some point in our life. Con artists are often very friendly and charming. Jason Hartman is joined by author, Chris Hadnagy to discuss social engineering and framing, and how it relates to personal, business and national security issues. The discussion centers on Chris' book, Social Engineering: The Art of Human Hacking. Chris defines social engineering as “any act that influences a person to take an action that may or may not be in their best interest.” He talks about the most important aspects of human hacking, such as influence – establishing rapport and asking for someone's help. Other aspects include reciprocity, concessions and social proof. Chris also explains the process of framing. Our framing is our foundation, our beliefs and morals, and social engineers work to understand a person's framing, looking for common ground. Chris Hadnagy, aka loganWHD, has been involved with computers and technology for over 14 years. Presently his focus is on the "human" aspect of technology such as social engineering and physical security. Chris has spent time in providing training in many topics around the globe and also has had many articles published in local, national and international magazines and journals Chris is a student of Paul Ekman's training classes on Microexpressions and has spent time learning and educating others on the values of nonverbal communications. He has combined what he learned with years of experience in a new research he has called nonverbal human hacking used to influence other people's emotions. He is also the lead developer of Social-Engineer.Org, as well as the author of the best-selling book, Social Engineering: The Art of Human Hacking. He has launched a line of professional social engineering training and penetration testing services at www.Social-Engineer.com. His goal is to help companies remain secure by educating them on the methods the "bad guys" use. Analyzing, studying, dissecting, then performing the very same attacks used by malicious hackers on some of the most recent attacks (i.e. Sony, HB Gary, LockHeed Martin, etc), Chris is able to help companies stay educated and secure. Chris runs one of the web's very popular security podcasts, the Social-Engineer.Org Podcast, which spends time each month analyzing someone who has to use influence and persuasion in their daily lives. By dissecting what they do, we can learn how we can enhance our abilities. That same analysis runs over to the equally popular SEORG Newsletter. After two years, both of these have become a staple in most serious security practices and are used by Fortune 500 companies around the world to educate their staff. Chris can be found online at www.social-engineer.org, www.social-engineer.com and Twitter as @humanhacker.
About the lecture Social engineering (also called "Human Hacking") is an essential tool in every computer hacker's toolkit. Yet its origins extend long before the digital age. This talk explores the evolution of this concept from its origins in public policy to its current application to cybersecurity. Dr. Hatfield's research includes interviews with famous hackers and offers a framework within which social engineering attacks can best be understood. About the speaker Lieutenant Commander Joseph M. Hatfield currently serves as an Assistant Professor in the Department of Cyber Science at the U.S. Naval Academy, where he teaches courses on the technical fundamentals of cybersecurity, the ethics and policy of cyber operations, and intelligence and national security. He is an active-duty naval intelligence officer with over a decade of overseas operational experience, including combat tours aboard the aircraft carrier USS Dwight D. Eisenhower as well as overseas assignments in both England and Sicily. He earned his Ph.D. at Cambridge University and has published scholarly work in journals and book chapters.
John Sileo’s identity was stolen from his business and used to embezzle $300,000 from his clients. While the thief covered his crimes using Sileo’s identity, John and his business were held legally and financially responsible for the felonies committed. The breach destroyed John’s company and consumed two years of his life as he fought to stay out of jail. In response, John made it his mission to help organizations and individual protect the data that underlies their wealth. Combining real-world experience with years of study, John became an award-winning author, trusted advisor and keynote speaker on identity theft, cyber security, online privacy and digital fraud. Link to episode: http://bit.ly/2oOfOIa Transcripts, blogs, and more: www.gdapodcast.com For booking info: www.gdaspeakers.com or call (214) 420-1999 twitter: @gdapodcast instagram: @gdapocast fb: facebook.com/gdapodcast
On this episode we have for the first time on the BFP a Girl on!!! not just any lady, no our very own Ruben Gonzales's sister Rubi. Her and the fellas talk a lil he she run in scenarios, shout outs to the J's, human hacking, social media etiquette, and finnally Air B&B vs hotels.Enjoy
What is Social Engineering (SE) and why should developers care? It is the ability to manipulate. It is the power to influence, elicit, and misdirect. It is a means hackers can use, for better or worse, to breach or protect companies, start or stop cyber wars, commit or prevent cyber crimes, and steal or secure your data. Social Engineer, hacker, & author Chris Hadnagy (@humanhacker) discusses the dangers technology companies & developers are exposed to everyday. Social Engineering has become an art form. It can be used to help or hinder others. Those that help prevent SE attacks like Chris are known as White Hats. Those that seek to harm and take from others with malicious intent are known as Black Hats. To Black Hats, we are just obstacles standing in the way of their goals. These individuals will do whatever they must to get us to reveal our secrets. Most times we even do this willingly, without ever realizing we have been hacked until it's too late. Seemingly trivial information to us may just be the last crucial piece of information a Black Hat needs. All the firewalls & countermeasures in the world can't protect us from ourselves. We can't afford to have our applications, our money, our lives hacked to bits because of our human nature. Chris talks with us on how we can prevent this from happening to us and our teams. Upcoming Events with Chris Hadnagy DEF CON 23 SECTF - http://www.social-engineer.org/ctf/def-con-23-sectf-rules-registration/ Black Hat USA 2015 in Las Vegas - https://www.blackhat.com/us-15/training/advanced-practical-social-engineering.html SE Training in Baltimore, MD - https://www.social-engineer.com/store/#!/5-9-October-2015-Advanced-Practical-Social-Engineering-Baltimore-MD/p/43984300/category=3286162 Resources Books by Chris Social Engineering : The Art of Human Hacking Unmasking The Social Engineer Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Books by Kevin Mitnick The Art of Deception: Controlling the Human Element of Security The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Social-engineer.org - http://www.social-engineer.org/ Social-engineer.com - http://www.social-engineer.com/ Paul Ekman Group - http://www.paulekman.com/ The Social Engineering Podcast - http://www.social-engineer.org/category/podcast/ @SocEngineerInc Twitter account - https://twitter.com/SocEngineerInc The Social Engineer Podcast episode 64 - http://www.social-engineer.org/podcast/ep-064-official-john-mcafee-social-engineer/ The Social Engineering Framework - http://www.social-engineer.org/framework/general-discussion/ Archive.org - https://archive.org/ Panelists Danny Blue - Front End Engineer at Deloitte Digital Erik Isaksen - HTML5 Google Developer Expert & Front End Engineer at Deloitte Digital
This week, Apple ditches Russia, North Korea drops a bomb on Sony... and we sift through the fallout, and 3D printing goes into space. All this, and much much more on The Drill Down. Headlines Apple Stops Online Sales in Russia Over Ruble Fluctuations After ruble's plunge, Apple reopens Russian online store with big price hike Google Top Global Trends 2014 Audible Book of the Week Social Engineering: The Art of Human Hacking by Christopher Hadnagy Sign up at AudibleTrial.com/TheDrillDown Music Break: Wrapped 2 from "Kreezus" by Local Business Comedy Hot Topic: Sony Hack Obama says Sony made a mistake to pull The Interview Sony Announces Limited Release for 'The Interview' Sony Threatens to Sue Twitter Unless It Removes Tweets Containing Hacked Emails Attack Is Suspected as North Korean Internet Collapses Google & MPAA Publicly Slam Each Other Over Piracy Music Break: New Sleighs from "Kreezus" by Local Business Comedy Final Word: 3D Printing NASA just emailed a wrench to space The Drill Down Video of the Week Dog runs for the first time thanks to 3D-printed prosthetics Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Box tech consultant Tosin Onafowokan. Occasionally joining them is Startup Digest CTO Christopher Burnor.
In this episode We revisit the 'human' side of hacking Chris tells us all about the Defcon CTF his team has hosted We discuss the role human nature plays in social engineering, or "Why the bad guys always win" Chris gives us his tips for making it harder for social engineers Michael and Chris talk metrics and measuring "getting better" Guest Chris Hadnagy ( @HumanHacker ) - Chris Hadnagy (author of Social-Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security) is a speaker, teacher, pentester, and recognized expert in the field of social engineering and security.Chris Hadnagy is the President and CEO of Social-Engineer, Inc. He has spent the last 16 years in security and technology, specializing in understanding the ways in which malicious attackers are able to exploit human weaknesses to obtain access to information and resources through manipulation and deceit.Chris is a graduate of Dr. Paul Ekman’s courses in Microexpressions, having passed the certification requirements with an “Expert Level” grade. He also has significant experience in training and educating students in non-verbal communications. He hold certifications as an Offensive Security Certified Professional (OSCP) and an Offensive Security Wireless Professional (OSWP).Finally, Chris has launched a line of professional social engineering training and penetration testing services at Social-Engineer.Com. His goal is to assist companies in remaining secure by educating them on the methods used by malicious attackers. He accomplishes this by analyzing, studying, dissecting, then performing the very same attacks used during some of the most recent incidents (i.e. Sony, HB Gary, LockHeed Martin, Target, etc), Chris is able to help companies understand their vulnerabilities, mitigate issues, and maintain appropriate levels of education and security.Chris has developed one of the web’s most successful security podcasts, The Social-Engineer.Org Podcast, and the equally-popular SEORG Newsletter. Over the years, both have become a staple in most serious security practices and are used by Fortune 500 companies around the world to educate their staff.You can find Chris's articles for local, national, and international publications and journals, including Pentest Mag, EthicalHacker.net, and local and national Business Journals. Links: Social Engineer Org - Your one-stop place for podcast, newsletter, and all things social engineering from Chris's team - http://www.social-engineer.org/ SECTF Report - http://www.social-engineer.org/ctf/social-engineer-inc-releases-annual-report-def-con-22-social-engineering-capture-flag-sectf-contest/ Social Engineer, Chris's company - http://www.social-engineer.com/
We have all had the experience of being taken advantage of at some point in our life. Con artists are often very friendly and charming. Jason Hartman is joined by author, Chris Hadnagy to discuss social engineering and framing, and how it relates to personal, business and national security issues. The discussion centers on Chris' book, Social Engineering: The Art of Human Hacking. Chris defines social engineering as “any act that influences a person to take an action that may or may not be in their best interest.” He talks about the most important aspects of human hacking, such as influence – establishing rapport and asking for someone's help. Other aspects include reciprocity, concessions and social proof. Chris also explains the process of framing. Our framing is our foundation, our beliefs and morals, and social engineers work to understand a person's framing, looking for common ground. To learn more about these types of social engineering, the positive and negative sides of them, visit www.HolisticSurvival.com.Chris Hadnagy, aka loganWHD, has been involved with computers and technology for over 14 years. Presently his focus is on the "human" aspect of technology such as social engineering and physical security. Chris has spent time in providing training in many topics around the globe and also has had many articles published in local, national and international magazines and journals.Chris is a student of Paul Ekman's training classes on Microexpressions and has spent time learning and educating others on the values of nonverbal communications. He has combined what he learned with years of experience in a new research he has called nonverbal human hacking used to influence other people's emotions.He is also the lead developer of Social-Engineer.Org, as well as the author of the best-selling book, Social Engineering: The Art of Human Hacking. He has launched a line of professional social engineering training and penetration testing services at www.Social-Engineer.Com. His goal is to help companies remain secure by educating them on the methods the "bad guys" use. Analyzing, studying, dissecting, then performing the very same attacks used by malicious hackers on some of the most recent attacks (i.e. Sony, HB Gary, LockHeed Martin, etc), Chris is able to help companies stay educated and secure.Chris runs one of the web's very popular security podcasts, the Social-Engineer.Org Podcast, which spends time each month analyzing someone who has to use influence and persuasion in their daily lives. By dissecting what they do, we can learn how we can enhance our abilities. That same analysis runs over to the equally popular SEORG Newsletter. After two years, both of these have become a staple in most serious security practices and are used by Fortune 500 companies around the world to educate their staff. Chris can be found online at www.social-engineer.org, www.social-engineer.com and twitter as @humanhacker.
Emotions cause an involuntary muscular response that last only 1/25th of second to 1 sec on a human face. Being able to decode these reactions can help a person communicate on a very deep and personal level. But how can they be used as a social engineer? Join us and Dr. Paul Ekman, world renowned for his research into microexpressions, as we explore this fascinating topic Release Date March 12 2012
SecuraBit Episode 83: Hey look its the Human Hacker!!! June 1, 2011 Hosts: Anthony Gartner – @anthonygartner http://anthonygartner.com Chris Gerling – @chrisgerling - MIA Christopher Mills – @thechrisam - MIA Jason Mueller – @securabit_jay - MIA Andrew Borel – @andrew_secbit Tony Huffman – @myne_us Tim Krabec - @tkrabec Guests: Chris Hadnagy ( @humanhacker on Twitter ) discusses Social Engineering: The Art of Human Hacking General topics: Social Engineering: The Art of Human Hacking http://www.amazon.com/Social-Engineering-Human-Hacking-ebook/dp/B004EEOWH0/ref=tmm_kin_title_0?ie=UTF8&m=AG56TWVU5XWC2 Social-Enginer.org - variety of guests who use social enginering Does Social Engineering Always Involve Deception? Marketing or Social Engineering Stereotypes online help from skype :)
Skeptics are well versed in the many tools of the trade used by charlatans and hucksters to defraud their unwitting victims. Some of these same tools - elicitation, pretexting, influence and manipulation to name a few - are also used by hackers, spies and identity thieves to obtain information. This week on Skepticality, Swoopy talks with Christopher Hadnagy, author of "Social Engineering, The Art of Human Hacking" which not only examines the maneuvers and the science behind them that are aimed at deceiving unsuspecting victims, but also addresses ways to reduce our own susceptibility to the hackers and security threats in our every day lives.
There has been a lot of buzz about the new book, Social Engineering: The Art of Human Hacking. Along with the “buzz” is some very positive reviews and feedback. The team at Social-Engineer.Org decided to gather a selection from the community as well as the SEORG team and interview the author, their very own Chris Hadnagy. Release Date Jan 10 2011