Social Engineering by Christopher Hadnagy
Author:Christopher Hadnagy [Hadnagy, Christopher]
Language: eng
Format: epub, mobi
Publisher: Wiley Publishing, Inc.
Published: 2010-11-24T05:00:00+00:00
Chapter 6
Influence: The Power of Persuasion
If you would persuade, you must appeal to interest rather than intellect.
—Benjamin Franklin
The epigraph sums up this entire chapter. You might be wondering why I didn’t include this within Chapter 5’s discussion of psychological principles of social engineering. Psychology is a science and a set of rules exists in it that, if followed, will yield a result. Social engineering psychology is scientific and calculated.
Influence and persuasion are much like art that is backed up by science. Persuasion and influence involve emotions and beliefs. As discussed in some of the earlier chapters, you have to know how and what people are thinking.
Influence and the art of persuasion is the process of getting someone else to want to do, react, think, or believe in the way you want them to.
If you need to, reread the preceding sentence. It is probably one of the most powerful sentences in this whole book. It means that using the principles discussed herein, you will be able to move someone to think, act, and maybe even believe the way you want him to because he wants to. Social engineers use the art of persuasion every day and, unfortunately, malicious scammers and social engineers use it, too.
Some people have devoted their life to researching, studying, and perfecting the art of influence. Those such as Dr. Ellen Langer, Robert Cialdini, and Kevin Hogan have contributed a very large repository of knowledge in this field. Mix this knowledge with the research and teachings of NLP (neurolinguistic programming) masters such as Bandler, Grinder, and more recently Jamie Smart, and what you have is a recipe to become a true artist.
True influence is elegant and smooth and most of the time undetectable to those being influenced. When you learn the methods you will start to notice them in commercials, on billboards, and when used by salespeople. You will start to get irritated at the shoddy attempts of marketing people and if you are like me, you will begin to rant and rave at terrible commercials and billboards while driving (which does not make my wife very happy).
Before getting into how social engineers will use in influence and persuasion, the chapter begins with a short tour of some of the key elements of persuasion and influence that I have compiled and used. This chapter will discuss things like reciprocation, manipulation, and the power of setting goals, just to name a few of these key elements.
Influence and persuasion can be broken down into five important aspects, as discussed in the following sections.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6636)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6359)
Machine Learning Security Principles by John Paul Mueller(6329)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5998)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5960)
Solidity Programming Essentials by Ritesh Modi(4070)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3711)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3439)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Blockchain Basics by Daniel Drescher(3308)
Learn Computer Forensics - Second Edition by William Oettinger(3198)
Incident Response with Threat Intelligence by Roberto Martínez(2929)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2837)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2815)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2787)
