
Social Engineering
161 FOLLOWERS
The master of manipulation and exploiting the human firewall. I circumvent every person's defense on every level.
Social Engineering
2y ago
Everything You Need To Know About Police Reports
Every social engineer who hits companies to the likes of Zalando, GoPro, Amazon, Apple, Nike, SteelSeries etc, differs to some degree In the way they manipulate representatives to credit their account for the full cost of the purchase product, or get a replacement Item dispatched while they still get to keep the original one. For Instance, some SE'ers are gifted In the art of "company manipulation and exploitation", hence everything they aim to achieve such as using the (somewhat) complex disposed of the faulty Item method, or perhaps pushin ..read more
Social Engineering
2y ago
How To Social Engineer All Types Of Jewellery
Each and every method used In today's world of "company manipulation and exploitation", triggers one or more events that will have an Impact on your SE, and If you haven't formulated It according to the nature of the Item, as well as neglecting to research the operations of both the company and their carrier partner(s), there's a very high chance your SE will come to an end In the early stages of the attack vector. For example, let's say you're planning to use the wrong Item received method, by saying that a different Item was In the pac ..read more
Social Engineering
2y ago
The Stages Of When Companies & Carriers Record Weights
If you're a regular reader of this blog, you'd see that the majority of tutorials discuss social engineering methods to the likes of (but not limited to) the wrong Item received, sealed box, missing Item, partial, boxing etc, for the reason that they're the backbone of each and every attack vector. And If you don't have one In place that's suited to the nature of the Item, as well as the company and carrier's operations, your SE cannot and will not make a start - It's simply not possible to exploit a given online store a ..read more
Social Engineering
2y ago
The DNAs That Work On Almost Every Occasion.
Without a shadow of a doubt, the calibre of your attack vector, Is only as good as "the method that's used to support It" throughout the entire social engineering session. You may have researched your target to perfection by gathering every detail pertaining to the carriers they use to service their deliveries, as well as how they operate when processing claims, right through to when they finalize their assessment but If you haven't paid much attention to "the suitability and effectiveness of your method", then your SE Is destined to fail. You se ..read more
Social Engineering
2y ago
Step By Step Guide To Formulate Traditional Methods
Every social engineering attack vector against companies to the likes of GoPro, Zalando, SteelSeries, Nike, Argos, Apple and of course the largest eCommerce company being Amazon, requires a calculated and strategic approach to deceive their representatives Into performing actions that they're not supposed to do - specifically generate refunds, and dispatch replacement Items at their expense. Be It SEing the latest gaming laptop worth around 3,000$ or simply a 2nd Generation Apple Pencil costing only 198$, both must be done with extr ..read more
Social Engineering
2y ago
Escalating Your Claim To A Senior Level
Social engineering has certainly come a long way since the old-school type evolved many decades ago, consisting of (but not limited to) "pretexting", "tailgating", "spear phishing", "quid pro quo", "phishing" and the rest of the names that someone happened to manifest with their fanciful Imagination. All that Is used to obtain confidential Information, gain access to a restricted building, remotely Infect a computer with malware, get the victim to click on a malicious link and the list goes on.
Nowadays, a much more sophisticated fo ..read more
Social Engineering
2y ago
Beginner's Guide To The Wrong Item Received Method
With regard to social engineering stores to the likes of (but not limited to) Wayfair, Zalando, Nike, Amazon, GoPro, Best Buy etc, with the Intention to deceive their representatives to perform actions that they're not supposed to do, namely reimburse funds and dispatch replacement Items at their expense, there's a lot to take on board to get the job done. Things like familiarizing yourself with the company's refund, warranty and returns policy, and the carrier partners they utilize to service their deliveries, Is absolutely cru ..read more
Social Engineering
2y ago
Warehouse Operations That Impact Certain Methods
In today's world of the sophisticated type of human hacking known as "company manipulation and exploitation", social engineers use their skillset to penetrate the defence of customer service reps to perform actions that they're not supposed to do - specifically deceive them to credit their account at the company's expense, or dispatch a replacement Item at no extra cost. In order to get the job done, there's a vital element called a "method" that must effectively be put Into practice with each and every attack vector, otherwise th ..read more
Social Engineering
2y ago
How To Get A Replacement Product Instead Of A Refund
Each and every social engineer, differs to some degree with their needs and wants when hitting stores to obtain goods absolutely free of charge. Be It a female who has an Interest In cosmetics, rings & bracelets and beauty products, or guys that predominantly focus on tech-based stuff to the likes of GPUs, SSDs, Apple AirPods, laptops and so forth, at the end of the day, the objective Is to deceive representatives to perform actions that they're not supposed to do - namely credit bank accounts for the cost of the purchase Item ..read more
Social Engineering
2y ago
What To Expect When Your Claim Is Being Assessed
Each and every company you decide to hit to the likes of WayFair, Zalando, John Lewis, ASOS and so forth, Is first done by navigating to their website and researching their terms & conditions to see the grounds on which refunds and replacements are Issued, and the next step, Is to checkout their carrier partner(s) who will be servicing your delivery to establish whether an OTP (One-Time Password) or a signature will be required when accepting your goods from the driver. After you've collected all the relevant details pertaining to ..read more