The Latest Social Engineering





Social Engineering Discussion

Find the Best Social Engineering from 2021 here:


Domain Stealing or How to Hijack a Domain

Please note this is an old technique again, just for learning purposes, learn how the old techniques worked and why they worked, then try and discover new ways to do things. Summary The sole purpose of the information contained in this advisory is to point out the flaws in InterNIC’s domain name handling system and […]

Topic: Networking Hacking Tools, Social Engineering

How to get Ops and takeover a channel on IRC Hack Hacking

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they […]

Topic: Hacker Culture, Hacking News, Social Engineering

US Veterans Information Leaked on The Web

Another HUGE information leak from the US government, seems they can’t help themselves. Or perhaps people are just ramping up the efforts against them.. The Navy has begun a criminal investigation after Social Security numbers and other personal data for 28,000 sailors and family members were found on a civilian website. The Navy said Friday […]

Topic: Hardware Hacking, Social Engineering

Kevin Mitnick Interview on Social Engineering

There’s a good interview with Kevin Mitnick on Social Engineering. Well afterall, that is where his skill lies, not in technical hacking. Arrested by the FBI in 1995 and convicted of breaking into the systems of Fujitsu Siemens, Nokia and Sun Microsystems, Mitnick served five years in prison–eight months of it in solitary confinement. In […]

Topic: Social Engineering

The Enemy Within The Firewall

I’ve seen similar figures from other organisations and countries, so the stats don’t surprise me. My peers and I have always called this Armadillo security, hard on the outside, soft on the inside. Firewall, IDS, etc…all protecting the exterior of the network, only edge devices, nothing inside, not much policies, not much privilege segregation, anyone […]

Topic: Social Engineering