What is Social Engineering?
Psychological manipulation techniques used to trick people into revealing confidential information or performing actions that compromise security. Social engineering exploits human trust rather than technical vulnerabilities.
Also known as: Human Hacking
"The weakest link in any security system is the human." Social engineering bypasses all technical security by simply asking for access—and being convincing enough to get it.
Core Principles Exploited
Authority
- Impersonating IT, executives, police
- People comply with authority figures
- "I'm calling from Microsoft support"
Urgency
- Create time pressure
- Prevent victim from thinking
- "This must be resolved immediately"
Reciprocity
- Do a favor, expect one in return
- "I helped you, now help me"
- Gift giving before request
Social Proof
- "Everyone else has provided this"
- "Your colleagues already approved"
- Following the crowd
Liking
- Build rapport
- Find common ground
- Attractive people get more compliance
Common Techniques
Pretexting
- Create false scenario
- "I'm from the bank fraud department"
- Detailed backstory for credibility
Baiting
- Offer something enticing
- Infected USB drives in parking lot
- "Free movie download"
Tailgating/Piggybacking
- Follow authorized person into building
- Hold door open for "coworker with hands full"
- Physical security bypass
Quid Pro Quo
- Exchange of services
- "Free tech support" that installs malware
- "Security audit" that extracts credentials
Vishing (Voice Phishing)
- Phone-based social engineering
- Impersonating technical support
- Extracting passwords over phone
Defense Strategies
Individual
- Verify identity independently
- Don't be afraid to say no
- Take time with unusual requests
- Trust your instincts
Organizational
- Security awareness training
- Verification procedures
- Clear escalation paths
- Culture of questioning
Real-World Example
Kevin Mitnick's techniques:
- Research target company
- Learn internal jargon and names
- Call posing as IT
- Reference real people/projects
- Request password "for emergency fix"
- Gain access without any hacking
Related Terms
Operational Security
The practice of protecting sensitive information by thinking like an adversary to identify vulnerabilities in your own behavior and communications. OPSEC goes beyond technical tools to address human factors that could expose you.
Phishing
A social engineering attack where attackers impersonate legitimate entities through fake emails, websites, or messages to trick victims into revealing sensitive information like passwords, credit card numbers, or personal data.
Have more questions?
Use our guided flow to get the right next privacy step for Social Engineering.
Open Guided Flow