Social Engineering Blogs

An Aggregator for Blogs About Social Engineering and Related Fields

The Episteme Blog November 4, 2009

Return-to-Barry-White Human Exploitation

Spent a weekend in early October hanging out with Tom and Kim at their rapport and anchoring bootcamp.  And I was talking in email with my friend Cris Neckar afterward where we were talking about the large number of pre-existing anchors that exist within someone’s already vast consciousness.

Cris’s comment was that using pre-existing material for anchors is “sort of like exploiting around DEP” – basically, the idea of a “Return-to-libc” exploit.  You have pre-existing functions that perform the task that you’re hoping to do.

This reminded me of something that Tom did to me during the weekend.  Tom walked up to me this weekend and said:

“So, you’re a hypnotist right?  You’ve been in trance before, you know what that feels like, don’t you?” And, as soon as I think about it (which I have to do to understand his question), he achors it.

Tom then proceeded to spend the rest of the weekend enjoying firing off the trance anchor at opportune times.

So, in our email conversation, Cris and I were talking about some good elicitations to anchor that many people would already have:

“Hey… remember that scene from Say Anything where John Cusack was standing outside with the boom-box on his head?  How romantic was that?  What was the most romantic movie scene you remember… one that just made your heart melt?”

Or: “As you wish” (for anyone who has seen the Princess Bride).

Or: “What’s the song that gets you most in the mood?”

In other words, the “Return-to-Barry-White” exploit. 

Note: I’m well aware that this isn’t at all new.  Neither’s ret2libc, really.  But it’s a great example that hopefully drives some new ideas and new thinking.


Filed Under: Security

The Episteme Blog September 23, 2009

Recap: The Hope Symposium

This past weekend, I had the privilege of speaking at  The Hope Symposium.  It was a small conference put on by my friends over at NLP Canada.

I was actually lucky enough to speak twice at the conference – I was the opening speaker and the final speaker before Chris and Linda closed out the conference.

More (including video of my talks) in the coming days, but for now, just a picture of me, Chris Ron Verreggen of RapidSuccessCoach.com.

ChrisMikeRon


Filed Under: Security

The Episteme Blog July 22, 2009

Greed as a prime motivator

I found this article the other day about the teen in Great Britain who managed to completely dupe a bunch of airline executives in believing that he was a millionaire who was looking to buy into their company and expand it. The key to the attack is that greed was the prime motivator in the attack. From

Filed Under: Security, Security Awareness, Social Engineering

  • « Previous Page
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • Next Page »

About

Welcome to an aggregator for blogs about social engineering and related fields. Feel free to take a look around, and make sure to visit the original sites.

If you would like to suggest a site or contact us, use the links below.

Contact

  • Contact
  • Suggest a Site
  • Remove a Site

© Copyright 2025 Social Engineering Blogs · All Rights Reserved ·