Skip to main content

Social Engineering.What is it ?

Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this.


Social Engineering?


=> The Process of tricking or a good plan to get your work done is known as Social Engineering.

This is very useful in our day to day life and it will make your life very.

Social Engineering is used by every person like Shopkeeper, Whole Seller, Large Companies, Hackers & Crackers.


We Will does not discuss shopkeeper or whole sellers or companies. As this blog is on Cyber Security So What Will We Discuss about. Ya, We will discuss Hackers and crackers. I will not tell you How they use but Why they use as our Honorable Google does not allow it. So, Let's Begin it?

Why Social Engineering?

=>Suppose you had made a virus and you told your friend to use, will your friend use it. If yes comment me below. But in most case, they will never use that virus app as they know that it is a malware. If you are a techy person then even your friends will hesitate in taking a genuine app from you. It also happens to me. Let me know in the comment section below that if your friend ever hesitates in taking any app from you.

Then what to do?

=>Ya here Social Engineering will work. You have to trick your friends to use it and it is completely up to you how will you trick your friends. I will not tell you how to use Social Engineering as I told you that it will violet the rules of Google. If you will use Kali Linux OS then you will come across the several tools to do it.

Later I will tell you how to use Kali in windows PC Live. So Follow me On Google+ to get notified.

Several Great Hackers told that 80% of Hacking is Done by Social Engineering. The Great Kevin Mitnick, The Father of hackers told that also and he is known as a great Social Engineer.

Without Social Engineering, Hacking is nothing. 

Some example of Social Engineerings are:-
  1. Combining Payloads(Malware) in important files. That's Why it is told that to turn off unknown sources in your phone and to download only from PlayStore.
  2. Phishing:-Ya Making a copy of the website to take necessary Credentials is also one type of Social Engineering.
     3. Physical Approach is also a Social Engineering.


We will discuss all the above later.

How To Prevent Us Being Hacked By Social Engineering?


  • Don't Download any app or software from any untrusted and unverified Source.
  • Always use an antivirus.
  • Don't use any pen-drive hard disk or any storage media without verifying them.
  • Never turn off Windows Defender in Windows PC.
  • Always Keep your mind active. On this, Kevin Mitnick says:-

Companies spend millions of dollars on firewalls, encryption, and secure access devices and it's money wasted because none of these measures address the weakest link in the security chain: the people who use, administer, operate and account for computer systems that contain protected information.

This Means unless you make your brain active then, everyone can hack your system, how much security may be there.


If You Want to become a Hacker, then be a good Social Engineer first.

I have a good news for you all, the news is that I had to remove Man In The Middle Attack post due to Google Policy but now you can read this, I will never leave giving tutorials on hacking. Even By Stoped by Anyone.

Here I'm giving you the link of my previous hacking blog post which I had removed:-Your Card Details Can Be Hacked.

If You Have Not Yet Read the Networking Basics then, Please Go And Read as it very important in hacking. Here is the link:-Networking Basics.


This is all for today. If you have any question, suggestion or you want that I should make a blog on your cyber topic then tell me in the comment section below. Hope you like this post.

Share It To Everyone By Clicking The Share Button. Hope You will do this for me.


Comments

Contact Form

Name

Email *

Message *

Popular posts from this blog

Zero Day Vulnerabilities| How to Be Safe?| Get Job with HUGE Salary.

Zero Day Vulnerabilities:- Hey, it's me, Arshad Aman, back again. Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this.

TOR | Dark WEB | You can Buy Spirit here......

Hey, it's me, Arshad Aman, back again.  Note:- This is only for Educational Purpose. I am not Responsible Whatever you do. Black Hat hacking and cracking and Black Hat SEO are illegal, You may be jailed for doing this. This is a technical blog but in the title, you had seen that I am going to tell that you can buy spirit. Ya, you had seen it is true. Here I am going to tell that You can buy a spirit on the internet. Without wasting any time lets get started. Layers on the internet:- The website and anything that you are visiting is only 1% of the total internet. Ya, it is true only 1%. That is called the Surface Web which is available or indexed on google or any other search engine. The most of the internet is hidden and not accessible to the normal internet user.  After the Surface Web, The next to come is Deep Web. Deep Web:- This is basically a website which is not indexed in any search engines like google. You need a link to enter into. This...