Security Through Education

A free learning resource from Social-Engineer, Inc

  • About
  • Newsletter
  • Resources
  • Contact
  • Social-Engineer, LLC
Home
  • Home
  • Blog
  • Podcast
  • Framework
  • More
    • SEVillage at DEF CON
    • SEVillage at DerbyCon
    • The Human Hacking Conference
    • What is Social Engineering?
    • Newsletter
  • Home
  • Blog
  • Podcast
  • Framework
  • EVENTS
    • SEVillage at DEF CON
    • SEVillage at DerbyCon
    • The Human Hacking Conference
  • YouTube
  • Linked In
  • Google Plus
  • Twitter
  • Facebook

The Social Engineering Framework

The Social Engineering Framework is a searchable information resource for people wishing to learn more about the psychological, physical and historical aspects of social engineering. Please use the index below to find a topic that interests you.

  • General Discussion
  • Information Gathering
  • Psychological Principles
  • Influencing Others
  • Attack Vectors
  • Social Engineering Tools

Framework Sections

Section Articles

General Discussion

Select a topic from the index below

  • Social Engineering Code of Ethics
  • Social Engineering Defined
  • Categories of Social Engineers
    • Hackers
    • Penetration Testers
    • Spies and Espionage
    • Identity Thieves
    • Disgruntled Employees
    • Information Brokers
    • Scam Artists
    • Executive Recruiters
    • Sales People
    • Governments
    • Everyday People
  • Why Attackers Might Use Social Engineering
  • Typical Goals
  • Common Attacks
    • Customer Service
    • Delivery Person
    • Phone
    • Tech Support
  • Real World Examples
    • Con Men
    • Crime Victims
    • Phishing
    • Politicians

General Discussion

Welcome to the Social-Engineer Framework. This is a work in progress, and will continue to be updated as attack methods adapt and change with the times. We feel it contains some of the most current scientific, technical and psychological information on the topic of social engineering today. Our goal is to create a repository of information for the security professional, penetration tester or enthusiast to learn and be armed with the most commonly used attack vectors today.

– The SE Team

 

NOTE: The information contained inside this framework is intended for use during a professional social engineering audit. Each reader will need to be aware of their location’s legal boundaries in regards to the tactics mentioned within.

Looking for a Good Book?

  

Looking for something?

Become a newsletter subscriber

Helpful Links

  • About
  • Blog
  • Framework
  • Podcast
  • Newsletter
  • Resources
  • The SEVillage
  • Contact
Back To Top Copyright © 2019 Social Engineer, Inc • All Rights Reserved • Site design by Emily White Designs