After
speaking to business people , Kivin Mitnick graciously accepted an invitation to attend an informal meeting in Moscow
hackspace .

This article is based on the "
memories " of the participants; these memories may have no connection with reality, but simply be an act of
social engineering .
')
(when writing this text, no Snowden was hurt)
GSM SpecialistIt was interesting to hear Kevin's opinion about snowing information:
“There are stupid people in the United States who believe that this [tracking all citizens] really helps national security. But many people understand that tracking does more harm than good. But I believe that he had in vain leaked information about how we follow foreigners. All this is done, there is no secret, but an open publication can lead to negative consequences for us. ”
Well, Kevin also said that Snowden probably had a lot more information with him than he gave to the press. And that he is very, very surprised at how poorly the protection of information is arranged inside the
NSA .
Member 0365Pretext is very important, you need to spend a lot of time on it; relationship of trust - it is important to find and use (company branches, contractors, etc.)
In training, the main thing is practice; if I had to teach someone, I would have to practice as much as possible.
Books by
Cialdini [
Robert Cialdini ] - must read, the basic principles really work (authority, reciprocity, etc.)
It's funny when people prepare to call and write down the text (script) - I always believe in the story I tell [the victim]
Real
soc. engineering is not a ready pretext and action in one move, it is improvisation and movement towards the goal in several stages.
Yes, in the end, the person will execute the code that you have sent - but he must do it with the feeling that he is receiving something important and necessary for him - service, information, etc. This allows you to divert his attention from the very fact of code execution.
Kevin Mitnick: “According to the results of
pentest, we decided to make a gift to admins - to give copies of my book, and sign it with“ their favorite password ”(obtained during the test). I thought it would be a good joke, but everyone was very tense - it turns out that many people used the same password for Internet banking. ”
DefCon MemberOnce again, the most important thing is practice. Everything that is written both in “The
Art of Deception ” and in “The
Psychology of Influence ” is a very interesting and useful theory (although, of course, only the basics), but you need to remember that these are not textbooks, and just acting according to an algorithm will not go far (the same as meeting girls)
The second important detail is the enjoyment of the process. This, of course, applies to any work, but there really is absolutely no way at all, otherwise it will just work out “on a piece of paper” and will most likely disappear. And here we just talked for a long time that the process is much more fun than the result itself.
Finally, the third is that SI (Social Engineering) can be used in life, but you should not abuse it. Hitchhiking and getting a free ticket to a concert is cool and fun, but trust between loved ones is important. Even Kevin said that poker is a rather boring game, because everyone is doing what they are bluffing (however, he later agreed that the opponent’s
cold reading is also cool.
Robotics developerMy own questions to Kevin were our data. It is a lot of ways to make it easier to use it. on us, how to guard against that. Basically, don’t let him keep it!
Member 001U: How do you maintain the proper level of technical knowledge?
Mitnick: I hire people smarter than myself. And learning from them.