SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
A guide to social engineering
                      by
          Dorkslayz/HackerMcAdams




                    Page 1 of 10
© Dorkslayz 2012
Disclaimer
    I am not responsible for any acts performed with
    knowledge gained from this eBook, this eBook is
      simply educating you on the practice of Social
                      Engineering.




 If you purchased this eBook from anywhere else than
     from me (Dorkslayz/HackerMcAdams) on either
           HackForums or SethHack Forums.
                    Please contact me.




                   Do not redistribute.




                         Page 2 of 10
© Dorkslayz 2012
Table of Contents
Getting Started.......................................................................................4
        Introduction to Social Engineering.......................................4
        The basics of Social Engineering............................................4
Possible targets to Socially Engineer..............................................5
Scenarios you may encounter...........................................................6
Company Specific Methods...............................................................7
        Intel...................................................................................................7
        Razer.................................................................................................7
        Microsoft..........................................................................................8
How to get Product ID's/Serials......................................................10
Tools/Resources...................................................................................10




                                                 Page 3 of 10
© Dorkslayz 2012
Getting started
              Introduction to Social Engineering
By definition, social engineering is "the art of manipulating
people into performing actions or divulging confidential
information." In this scenario, we will be using it to get free
stuff from companies by telling them that we have one of
their products and it has malfunctioned, causing them to
send us a replacement.

                   The basics of social engineering
Social engineering isn't a straightforward process that can
be applied to any and every company. It differs from
company to company, company specific procedures will be
covered later in the eBook.
The basic technique behind Social Engineering is to make
the representative believe you are telling the truth, or to
make the representative feel sorry for you. It's up to you
which path you decide to take, I prefer the "Telling the truth
one" but it's a matter of opinion and you must remember to
be persistent, if they deny your request for a replacement
then go onto their twitter/facebook account and tweet/post
on their wall something along the lines of "x is rubbish, they
straight out refused to replace my broken y. :(" replace "x"
with the company name and "y" with the product and that
should be enough to get them to accept your replacement
request.

                               Page 4 of 10
© Dorkslayz 2012
Possible targets to Socially Engineer
     I've ranked various companies based on difficulty, the
     difficulty rating may increase over time as companies
         become more resilient to socially engineering.
                              Easy
                         • Logitech
                         • Pringles
        • McDonalds/Burger King/Any fast food restaurant
                           • Intel
                        • Microsoft
                    • Coca Cola, Pepsi, etc
                           Medium
                             • AMD
                           • Otterbox
                            • Phillips
                             Hard
                            • Razer
                          • SteelSeries
                           • Amazon
                        • Western Digital
                            • Apple
                            • Sony
                            • Rolex
                           • Iomega
                            Page 5 of 10
© Dorkslayz 2012
Scenarios you may encounter

• The support agent requests that you send the item back.
•   A) You can say you lost the item but noted down
    the serial, etc before it was lost.
•   B) You can say that you threw the item away because it
    did not work and you didn't think you would have to
    return it.
•   C) You got angry because the item didn't work and
    threw it at a wall, causing it to break even more.


• The support agent requests you take a picture of the item
  (with or without a code on a piece of paper)
•   A) You can google pictures of that item and if
    necessary photoshop a piece of paper in.
•   B) Claim you do not have a camera




                          Page 6 of 10
© Dorkslayz 2012
Company specific methods
                             Intel
  Step 1 - Start a live chat session with Intel or Call them up
    Step 2 - Tell them your Processor or SSD has stopped
                              working
  Step 3 - They will most likely ask you a few questions and
        ask for your email/offer to send you an email
Step 4 - They may or may not ask you to answer some more
                     questions, answer these.
   Step 5 - For the serial number, Look in AstroPID or On a
                          youtube video
   Step 6 - For proof of purchase, use the amazon receipt
                       generator or similar.
      Step 7 - You should receive email confirmation or
instructions, if they ask you to send it back then please refer
              to "Scenarios you may encounter".

                            Razer
Step 1 - Razer do not have a phone line or live chat system,
so you must email them saying your mouse (or whatever) is
    not working and provide a genuine problem like the
                   buttons are not working.
 Step 2 - You should get a reply in which they may suggest
    ways to fix the issue, you must say that none worked.
 Step 3 - If they ask you any other questions, answer them.
  Step 4 - They should email you a form to fill out, fill it out.


                            Page 7 of 10
© Dorkslayz 2012
Step 5 - For the proof of purchase, you can either use the
  amazon receipt generator or claim you do not have one
(You can use an excuse such as it was a gift and the person
who gave it to you has passed away or has gone go another
                             country)
   Step 6 - For the serial, use AstroPID or Find one from a
                        youtube video.
Step 7 - They will either accept your RMA or Deny it, if they
  deny it then refer to the bottom of "The basics of social
                         engineering".
   Step 8 - You should receive an email confirming your
                         replacement.


                         Microsoft
 Step 1 - It's best to call them, however you can Email if you
                         want to do that.
Step 2 - When you get through to a live person, they should
  ask for your name and phone number. You can make up
          your phone number if you're using Skype.
   Step 3 -They should ask you some questions about the
product, you can say you received it as a gift or you bought
                         it, it's up to you.
Step 4 - They will help you fix the product, but say that none
                             of it works.
Step 5 - You should receive a case number, write it down for
future reference. and you should get transferred to another
                                person.

                           Page 8 of 10
© Dorkslayz 2012
Step 7 - When you get connected, tell them your name and
   Case Number and they make ask you some questions.
 Step 8 - They should ask you for an email and say they are
 willing to replace it, if they don't then continue to Step 9.
Step 9 - They may ask you to ship it back in, if they do then
  go with it and after a week or two, call up, present your
name and Case number and say you shipped your product
              in and have they received it yet.
      Step 10 - They will say no and have to replace it.
 Step 11 - You then should get confirmation that they will
                             replace it.




                           Page 9 of 10
© Dorkslayz 2012
How to get Product ID's/Serials
  Product ID's (Abbreviated as PID's) are not that difficult to
  get a hold of. There are a wide range of PID's available on
   AstroPID for you to generate however if the PID you are
  looking for is not there, you can try any of these methods.
  •    Find your item on Ebay, contact the seller and ask for
              the PID for "Verification Purposes".
•     Watch a youtube video on the item, you may be able to
                   find a PID on the Item there.
    •   Ask your friends if they have the item and if so, ask
                  them if you can have the PID.
      • If you have the item, try and find the PID on it.



                      Tools/Resources
            Amazon Receipt Generator - http://j.gs/18Fy
                   AstroPID - http://j.gs/18G2
            BestBuy receipt template - http://j.gs/18G8




 Thanks for buying, if you would like to resale this
                 eBook, contact me.
 If you think I have forgotten something, contact
                         me.

                             Page 10 of 10
© Dorkslayz 2012

Mais conteúdo relacionado

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Destaque

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Destaque (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Google Nexus 7 Phone

  • 1. A guide to social engineering by Dorkslayz/HackerMcAdams Page 1 of 10 © Dorkslayz 2012
  • 2. Disclaimer I am not responsible for any acts performed with knowledge gained from this eBook, this eBook is simply educating you on the practice of Social Engineering. If you purchased this eBook from anywhere else than from me (Dorkslayz/HackerMcAdams) on either HackForums or SethHack Forums. Please contact me. Do not redistribute. Page 2 of 10 © Dorkslayz 2012
  • 3. Table of Contents Getting Started.......................................................................................4 Introduction to Social Engineering.......................................4 The basics of Social Engineering............................................4 Possible targets to Socially Engineer..............................................5 Scenarios you may encounter...........................................................6 Company Specific Methods...............................................................7 Intel...................................................................................................7 Razer.................................................................................................7 Microsoft..........................................................................................8 How to get Product ID's/Serials......................................................10 Tools/Resources...................................................................................10 Page 3 of 10 © Dorkslayz 2012
  • 4. Getting started Introduction to Social Engineering By definition, social engineering is "the art of manipulating people into performing actions or divulging confidential information." In this scenario, we will be using it to get free stuff from companies by telling them that we have one of their products and it has malfunctioned, causing them to send us a replacement. The basics of social engineering Social engineering isn't a straightforward process that can be applied to any and every company. It differs from company to company, company specific procedures will be covered later in the eBook. The basic technique behind Social Engineering is to make the representative believe you are telling the truth, or to make the representative feel sorry for you. It's up to you which path you decide to take, I prefer the "Telling the truth one" but it's a matter of opinion and you must remember to be persistent, if they deny your request for a replacement then go onto their twitter/facebook account and tweet/post on their wall something along the lines of "x is rubbish, they straight out refused to replace my broken y. :(" replace "x" with the company name and "y" with the product and that should be enough to get them to accept your replacement request. Page 4 of 10 © Dorkslayz 2012
  • 5. Possible targets to Socially Engineer I've ranked various companies based on difficulty, the difficulty rating may increase over time as companies become more resilient to socially engineering. Easy • Logitech • Pringles • McDonalds/Burger King/Any fast food restaurant • Intel • Microsoft • Coca Cola, Pepsi, etc Medium • AMD • Otterbox • Phillips Hard • Razer • SteelSeries • Amazon • Western Digital • Apple • Sony • Rolex • Iomega Page 5 of 10 © Dorkslayz 2012
  • 6. Scenarios you may encounter • The support agent requests that you send the item back. • A) You can say you lost the item but noted down the serial, etc before it was lost. • B) You can say that you threw the item away because it did not work and you didn't think you would have to return it. • C) You got angry because the item didn't work and threw it at a wall, causing it to break even more. • The support agent requests you take a picture of the item (with or without a code on a piece of paper) • A) You can google pictures of that item and if necessary photoshop a piece of paper in. • B) Claim you do not have a camera Page 6 of 10 © Dorkslayz 2012
  • 7. Company specific methods Intel Step 1 - Start a live chat session with Intel or Call them up Step 2 - Tell them your Processor or SSD has stopped working Step 3 - They will most likely ask you a few questions and ask for your email/offer to send you an email Step 4 - They may or may not ask you to answer some more questions, answer these. Step 5 - For the serial number, Look in AstroPID or On a youtube video Step 6 - For proof of purchase, use the amazon receipt generator or similar. Step 7 - You should receive email confirmation or instructions, if they ask you to send it back then please refer to "Scenarios you may encounter". Razer Step 1 - Razer do not have a phone line or live chat system, so you must email them saying your mouse (or whatever) is not working and provide a genuine problem like the buttons are not working. Step 2 - You should get a reply in which they may suggest ways to fix the issue, you must say that none worked. Step 3 - If they ask you any other questions, answer them. Step 4 - They should email you a form to fill out, fill it out. Page 7 of 10 © Dorkslayz 2012
  • 8. Step 5 - For the proof of purchase, you can either use the amazon receipt generator or claim you do not have one (You can use an excuse such as it was a gift and the person who gave it to you has passed away or has gone go another country) Step 6 - For the serial, use AstroPID or Find one from a youtube video. Step 7 - They will either accept your RMA or Deny it, if they deny it then refer to the bottom of "The basics of social engineering". Step 8 - You should receive an email confirming your replacement. Microsoft Step 1 - It's best to call them, however you can Email if you want to do that. Step 2 - When you get through to a live person, they should ask for your name and phone number. You can make up your phone number if you're using Skype. Step 3 -They should ask you some questions about the product, you can say you received it as a gift or you bought it, it's up to you. Step 4 - They will help you fix the product, but say that none of it works. Step 5 - You should receive a case number, write it down for future reference. and you should get transferred to another person. Page 8 of 10 © Dorkslayz 2012
  • 9. Step 7 - When you get connected, tell them your name and Case Number and they make ask you some questions. Step 8 - They should ask you for an email and say they are willing to replace it, if they don't then continue to Step 9. Step 9 - They may ask you to ship it back in, if they do then go with it and after a week or two, call up, present your name and Case number and say you shipped your product in and have they received it yet. Step 10 - They will say no and have to replace it. Step 11 - You then should get confirmation that they will replace it. Page 9 of 10 © Dorkslayz 2012
  • 10. How to get Product ID's/Serials Product ID's (Abbreviated as PID's) are not that difficult to get a hold of. There are a wide range of PID's available on AstroPID for you to generate however if the PID you are looking for is not there, you can try any of these methods. • Find your item on Ebay, contact the seller and ask for the PID for "Verification Purposes". • Watch a youtube video on the item, you may be able to find a PID on the Item there. • Ask your friends if they have the item and if so, ask them if you can have the PID. • If you have the item, try and find the PID on it. Tools/Resources Amazon Receipt Generator - http://j.gs/18Fy AstroPID - http://j.gs/18G2 BestBuy receipt template - http://j.gs/18G8 Thanks for buying, if you would like to resale this eBook, contact me. If you think I have forgotten something, contact me. Page 10 of 10 © Dorkslayz 2012