
Facebook has already served our starter window at: “”. On the log on screen, he notice a link named “forgotten account”, Here John will be using the benefit of “ forgotten account (password recovery)” feature.

He visits Facebook page to find a way to hack someone’s account. Then he takes a sheet of paper, sits in his chair, which is facing his computer. He is thinking and wondering while sitting at his desk. He is planning to get the strategy to hack his friend’s facebook account. We can do multitasking, but its not doing the different tasks together at the same time, instead we just switch our attention to each task quickly.Īt the beginning of the day, on Monday, in the office, as usual John is in his room siting at his desk. In one of his presentations, Robbins said that, we have two eyes, but our brain can only focusing on one thing. One day, John “bad guy”, is determined to practice Social Engineering Attack using “ATTENTION” game, which i mentioned earlier, he got inspired by “The King of Thieves” Apollo Robbins.

They often meet and talk to each other until now they are mates. John and Bima are working in different departments, the only occasion they meet is when they have lunch in the canteen. John and Bima are friends, they often meet in the canteen at lunch time during rest time in the their office. The attack flow will use a different approach and method. The goal of Social Engineering Attack here is, to get access to the victim’s Facebook account. This scenario involves 2 actors, John as an attacker and Bima as a victim. The key with “ATTENTION” is to keep talking fast, and ask questions.
How to use social engineering toolkit in termux how to#
I will show you how to conduct Social Engineering Attack to hack someone’s Facebook account using “TRUST” and “ATTENTION”. His ability is mainly, playing with the victim’s attention to pickpocket their stuff, such watches, wallet, money, card, anything in the victims’ pocket, without recognition. He once explained in a TED Talk, about how to steal things. His background is skilled magician, street magician. I got this lesson from a “King of Thieves” Apollo Robbins. And in this article we will learn about “ATTENTION”. In the last Social Engineering Attack article we learned the Social Engineering Attack using “TRUST”. The main point of Social Engineering Attack is about “designing the attack flow”. In the last article, i did a demo of Google account targeting, Kali Linux: Social Engineering Toolkit, this is another lesson for you.ĭo we need certain Penetration Testing OS to do Social Engineering Attack? Actually not, Social Engineering Attack is flexible, the tools, such as Kali Linux are just tools. Humans are the best resource and the end-point of security vulnerabilities ever. Doing Social Engineering Attack is easy, trust me, it is really easy. The difference is, in Social Engineering Attacks, its a magic trick where the result is a banking account, social media, email, even access to a target computer. Social Engineering Attacks (from the hacking perspective) is quite similar to performing a magic show. You realize people in front of you are fools who are amazed by dumb things.

If you are a magician, you may have some feelings of satisfaction when you successfully tricked your audience. There is a sense of art to operating in the realm of mind tricking.
