4
Becoming Anyone You Want to Be

Everything you can imagine is real.

—PABLO PICASSO

If I could, I would have this chapter open with the Mission: Impossible theme song, but sadly we haven't figured out how to embed music into the pages of a book. But at least I have you thinking about that catchy tune, which is fitting for this chapter.

Becoming anyone you want be—which in social engineering is called pretexting—sounds super sexy. Some people define pretexting using words like lie, falsehoods, and other negative terms. However, I like to define pretexting in more general terms. The way I explain it in The Social Engineering Framework on my company's website (www.social-engineer.org/framework/influencing-others/pretexting) is this:

Pretexting is defined as the practice of presenting oneself as someone else in order to obtain private information. It is more than just creating a lie; in some cases it can be creating a whole new identity and then using that identity to manipulate the receipt of information. Pretexting can also be used to impersonate people in certain jobs and roles that they never themselves have done. Pretexting is also not a one-size-fits-all solution. A social engineer will have to develop many different pretexts over their career. All of them will have one thing in common: research.

In one job, I had to break into seven different warehouses, and I decided to pose as a fire extinguisher inspector. In another job, we had to gain entry to the C Suite and the mail room of a company, so I pretended to be a pest control serviceman. For yet another job, I had to gain access to the security operations center (SOC) and network operations center (NOC), so I started off as an interviewee for a job, but after I gained access to the building, I had to switch to something else—so I posed as a manager from out of state. I've also presented myself as the head of human resources (HR) and a phone support rep. I could go on and on, but you get the idea: I've played lots of different roles.

The point is that there is no such thing as one pretext that fits all situations, and that is why this chapter is so important. I spend most of the chapter talking about the principles of pretexting and how you can apply them to any situation, whether you are social engineering via phone, email, social media, or in person. I take you through one job that I feel helps truly explain all these principles.

The following are the principles I discuss in this chapter:

  • Thinking through your goals
  • Understanding reality versus fiction
  • Knowing how far to go
  • Avoiding short-term memory loss
  • Getting support for pretexting
  • Executing the pretext

Pretexting can be one the most fun parts of the job, but it can also be one of the most dangerous. If you do not apply these principles, there can be drastic consequences. I will tell you stories of both successes and failures when it comes to pretexting.

Knowing how to pretext is vital if you want to have a career as a professional social engineer. It can truly make the difference between success and failure on the job.

The Principles of Pretexting

Before I delve into each one of the principles, I want to discuss a technique that has helped many aspiring social engineers: method acting or improvisation (aka improv).

Many cities offer method acting or improv classes that anyone can attend for a couple weekends. Many of the tips I give you in this book are covered in those kinds of classes, but the classes can give you something that a book can't help you with: experience.

A method acting or improv class can help you learn to step out of your comfort zone, get into character, and learn what is needed to successfully plan and execute pretexts in the wild. However, not everyone reading this book will be able to find a local class. No worries: you can purchase a DVD called Uta Hagen's Acting Class from Amazon.com (www.amazon.com/Uta-Hagens-Acting-Class-DVDs/dp/B0001Z3IHG). You can also find the video by searching YouTube. This excellent resource takes you through the steps of pretexting and getting into character.

However, even with a good acting class or video, you still need to know the six best tips for learning to pretext. Let's get started with the first one.

Principle One: T hinking T hrough Your Goals

Fire extinguisher inspector, pest control serviceman, HR manager—these are just a few of the pretexts I mentioned that I have used. How did I go about determining which one to use at each location or target?

It all starts with OSINT, where I dig into the details of the person or company and look for relevant stories, news, hobbies, likes, dislikes, events, and so on (and which I cover in more detail in Chapter 2, “Do You See What I See?”). These significant bits of data can tell me a lot about which pretext I should I focus on. But there is one other key piece of information that will determine which pretext jumps out of my arsenal into action: the goal. Understanding what it is I am trying to accomplish is more important than just understanding the business I am trying to infiltrate. Let me illustrate by telling you a story that I call, “The 18th-Floor Escapade.”

I was hired to gain entry to the 18th floor of a secure building. The building was owned and operated by a property management company that was not my client (a company that produces online audio content). The only floor I was allowed to gain access to in this test was the 18th. Generally, this company does not allow walk-in appointments. The elevators were key-carded. And corporate headquarters was in another state.

During the OSINT phase, my team had found very little about the names and identities of the client company's employees who worked inside the target building. However, we did find a manager of the company’s name as well as some of the content that manager produced there.Additionally, we located some documents on a file server that the company didn't intend to be public: a safety checklist, some internal communications newsletters, marketing material about upcoming projects, and a few other miscellaneous documents.

Based on just this information, what seems like a good pretext to you? Think about it for a second before reading on. Try to come up with at least one pretext.

Maybe you thought of an elevator repairman? That would give you reason to be in the elevator without alarming security. Maybe you thought of a rep from the company's headquarters who was at the office to conduct a surprise audit? Or maybe you thought of a different pretext that I didn't even mention here.

Here are a few other details that will help inform the pretext: My mission, if I did get inside the building and to the 18th floor, was to successfully take video and photos of exits and entryways. I was to take photos of any unlocked computers and try to get pictures of any papers or projects that were not public.

Given all those details, I had to make sure my pretext covered the ability to roam close to computers and desks, and I had to either have a camera out or be able to use a hidden camera to get the required photos.

An elevator repairman would have been a terrible pretext to accomplish the goals. Would it have gotten me in the building? Yes, but I wouldn't have gotten anywhere near my goals.

Posing as a representative from headquarters—might have gotten me into the building and onto the floor and even into offices, but there would have been limitations. I would have needed to know who worked in that office so my “surprise visit” could be fruitful.

From the safety checklist that I'd found on the file server, I learned that this company had strict guidelines about their staircase doors. They were never to be unlocked from the staircase. As a matter of fact, there weren't even supposed to be handles on the doors that were accessible from the stairwell.

Using this information, I developed a pretext that I was a third-party safety consultant. Because of a problem found in another branch, I had been sent to do quick 15-minute checks of the exits to ensure that proper policies were being followed. My visit was not announced, so the staff at the office I was visiting could be surprised and be found handling things correctly without any warning. To ensure the client that I was honest, I needed to record the whole event on my camera.

Do you see how having specific goals changed my pretext for the better? Having the full details enabled me to develop a part of the pretext that helped me achieve all my goals without causing alarm. Powerful, right?

Armed with this information, let's jump into the second principle, where I'll give you more details about “The 18th-Floor Escapade.”

Principle Two: Understanding Reality vs. Fiction

This principle can be easily defined by explaining how much easier it is to remember your pretext if you base it in reality—for you and for the target. By this, I mean you should try to use pieces of your real life and use knowledge you already have or can easily assimilate. I often tell people that I think one of the hardest relationships to fake is a father-daughter relationship. I didn't understand this relationship until I had my own daughter. The way I talk about her and the emotions I feel are near impossible to fake, I think. If I didn't have a daughter but needed to build rapport with a target who did, it would be dangerous to have a pretext that includes a fake daughter. But, I can have a niece, right?

My point is that your pretext should be based on facts, emotions, and knowledge that you already possess or can easily fake. Going back to some of my proposed pretexts from the previous section, I know very little about elevators and their operation, so trying to fake my way as an elevator repairman would most likely have led to my failure if I were to be quizzed.

In addition, I tend to choose a name that I can easily answer to. Some people can answer to a name that is not theirs, but most choose to go with one that they have used or been called or that is a variation of their name.

This probably goes without saying, but generally, I try to stick with male characters for onsite, in-person social engineering. But I have pretexted as a female when doing online, social media, and even phone social engineering.

In terms of reality for the target, you should try to base your pretext on something that will keep your target in that alpha mode. (You might remember the discussion of alpha mode in Chapter 1, “A Look into the World of Social Engineering.”)

If the subject is familiar to the target—meaning the words, titles, and context are expected—then you are more likely to leave the target in alpha mode so the person isn't alerted to potential danger.

For my “The 18th-Floor Escapade,” I was using a document that I had found during OSINT. I wasn't trying to learn new skills, so I was not only in the reality zone for my targets but also in my own reality zone.

Sometimes, though, as you start to plan out the reality, you may have trouble trying to decide how much is too much.

Principle Three: Knowing How Far to Go

Knowing how far to go—without going too far—is very important. In my classes, I often have students who want to build whole lives for their pretexts. Some want to get as detailed as what they ate at their 11th birthday party.

When it comes to deciding how much detail to create, keep this in mind: people will only care about what they have to in order to complete the “social contract” you have created.

Let me elaborate on that a bit. In my safety-inspector pretext for “The 18th-Floor Escapade,” what do you think the target cared about?

In this case, they didn't care about my kids' names, my dogs, or what I had for breakfast. They cared about the four questions I mention in Chapter 3, “Profiling People Through Communication”:

  • Who are you?
  • What do you want?
  • Are you a threat?
  • How long will this take?

Let's think through what the target will want to know ASAP regarding my pretext:

Q: Who are you?
A: I am a safety inspector sent by corporate to do a very quick audit to ensure all policies are being followed.
Q: What do you want?
A: I just need about 15 minutes of your time to do this quick audit.
Q: Are you a threat?
A: There is an urgent need for me to do this, but no one is in trouble at all.
Q: How long will this take?
A: Hopefully less than 15 minutes.

The rest of the details are extras that the target doesn't need or care about. Does that mean you can go in unprepared? Not at all. You should still be prepared with some basic information about your “character” in case your target asks. So, I developed a pretext that followed a path like this:

  • I am Phil Williams, a 40-year-old safety inspector. I have one child. I'm married. I don't have any pets, but I love dogs and cats. I'm pretty boring; I go to work and go home. I've lived in X state for X years.

With that very basic pretext, what knowledge do I need to know to make sure I can pull it off?

  • Name of wife
  • Name of child
  • Age of child
  • The state
  • The city within that state
  • My job role and what I do for the company

That's basically it. Maybe there are a couple more tidbits that are worth planning, but for the most part, these basics are all I'd be asked to reveal.

Let me give you an example of a time when someone didn't know when to reel it in on the pretext: I was once working with a student on a homework assignment. He'd had a failure at approaching a stranger the night before, and to help him build confidence in the wake of that failure, we went to the hotel lobby so I could watch him engage with a stranger. My goal was to watch him engage to see where he was going wrong and then offer advice on how to “fix” it.

The student walked up to a woman and started off so nicely. He had a warm smile, and he was really friendly looking. The woman started to engage with him, and I saw her body language change to warm and friendly with her hips turned toward him. (You'll read more about body language in Chapter 8, “I Can See What You Didn't Say.”) The student asked the woman where she was from, and she responded with a smile, “Philadelphia.”

He says, “Oh really? That's amazing. Me, too!” Unfortunately, nothing was further from the truth. As I heard those words come from his mouth, I saw the train wreck starting in slow motion.

The woman replied, “Well, that's amazing! Where do you live?”

The student realized that he had just shoved not only a foot in his mouth but his whole leg. He replied, “Umm, you know. By that big bell thing …” His voice trailed off because he knew he was about to be hit head-on.

“The bell thing?” she asked. “You mean the Liberty Bell?”

“Oh, yeah. That is what I meant … ,” he said sheepishly.

“First of all, I don't know what your game is, but ‘bell thing’? No one from Philly would call it the ‘bell thing.’ And secondly, there is no housing near the bell thing. This conversation is over.” She turned and walked away.

The student came over to me and said, “Man, that is basically my last two nights.”

I asked him to tell me in detail how the last two nights' conversations went. As he described the conversations, the problem became clearer to me: he just agreed to whatever the target said without having the knowledge to back it up.

He took the lesson on “tribe mentality” (which I discuss in detail in Chapter 5, “I Know How to Make You Like Me”) to mean he needed to join whatever tribe the target said they were in, and they would automatically love him.

This student's experience is a good lesson in pretexting for all of us. It is important to have some knowledge of the details of your pretext. In the student's encounter with the woman from Philadelphia, all he would have needed to do to become part of her tribe was to change one sentence into a validating question, something like this: “Philly? I hear that's a great city to go be a tourist in. I've never been. What are your favorite things about Philly?” That would have told her he was listening and interested and wanted to learn more—instead of pretending that he had knowledge that he didn't.

Mastering this one concept can make a huge difference in the success you have with pretexting. After you are successful with the initial contact, people you interact with start to give you lots of details. All that detail can become hard to remember—which leads us to the next principle.

Principle Four: Avoiding Short-Term Memory Loss

It happens to all of us: you meet someone for the first time, engage in a good conversation, and then, as you are leaving, you can't remember the person's name. This can be a real deal-breaker for some folks, and it can make you appear as if you aren't interested in the person.

I have found there are more people who have a hard time remembering the details than those who have no problem at all. That is the reason this section is so important. You don't inspire confidence if you whip out a notebook mid-conversation to look at some details about your story. And it is even more concerning to the person you are speaking to if they catch you writing down details about them.

We have all heard the tips that say something like this: “Use the name as many times as you can in the first 20 seconds of hearing it, and you will remember it.” That tip does work, but it doesn't always make practical sense to repeat a person's name rapidly right after hearing it. I can almost imagine meeting you for the first time, and as you exhale, you say, “Ah, Chris, Chris, Chris … yes Chris … Chris is your name. So, Chris, what were we talking about, Chris?”

Umm … creepy. Please don't do that when we meet.

With that said, I do find that using a person's name in some meaningful way can aid in remembering it. In “The 18th-Floor Escapade,” as I entered the building and headed straight for the elevator, a security guard stopped me. She held one hand up and said, “Excuse me, where are you going?”

I stopped, knowing I would have to enter this into the report, “Oh, I'm so sorry, ma'am.” I held my hand out and said, “I'm Phil Williams from “[the name of the company, which I'd prefer not to divulge] headquarters. We have an office here on the 18th floor.”

She looked through a list she had on a clipboard and then said, “I'm sorry, Mr. Williams. I don't see your name on the list of approved visitors today.”

“You are 100% right. My name won't be there. I'm sorry—I'm so rude. What is your name?” I said as I looked at her name badge. “Claire, nice to meet you.”

I paused for only a second, “See, Claire, we had an incident at one of our locations due to some safety policies not being followed, and I was sent out to visit our NE offices to ensure that all policies are being followed. These need to be surprise visits, so we can ensure that the findings are legit.”

“I see.” Claire said.

“And one of the sections on this report is front-desk security. I'm happy to have your name, so I can report that you followed all procedures perfectly. I have your first name—and how do you spell your last name?” As I said this, I pulled out my pen, looked down at my clipboard, and wrote her first name on my own list.

She didn't even pause before she said, “Farclay. That's F-A-R-C-L-A-Y.”

“Okay, Ms. Farclay. You have gotten this audit off to a great start. Thank you for that. Now, what I hope to find is that my surprise visit ends with as high marks as you will get.”

She then did something I had not expected. “Well, Mr. Williams, how about I badge you to 18, and you can see if your surprise audit yields some positive results?” she offered.

“Claire! Wait, can I call you Claire?” She nodded, so I continued, “Claire, you are a genius! That is a great idea.”

With pride, she walked her new friend (me) over to the elevator bays and used her security badge to open the doors and then badge me to the 18th floor. I thanked her and said, “I will see you in 15 minutes.”

So, what was the key for me in that situation?

  • Using the guard's name a few times in quick order
  • Having as part of my pretext a reason to write everything down

For me, although these techniques work wonders, they're not always practical. For that reason, you need to have other methods in your arsenal. I employ a few different techniques:

  • The business card: Exchanging business cards with a target is a great way to get all their details. But don't start off with this—wait until you build some rapport or are leaving.
  • Recording devices: I sometimes record both audio and video of live engagements and audio of phone engagements to ensure I capture all the details. This can be a great tool, but make sure to get permission from the company before you record anything or anyone on their premises.
  • A partner: I find it helpful to have someone else work with me so that person can help remember the details while I focus on other things.

All these ideas are great for keeping the details safe for the report that will follow, but they are not too useful for remembering the details while you're in the middle of an engagement.

Here are a few tips:

  • Practice. As often as you can, practice remembering details where and when it's not part of your job to do so—family gatherings, parties, meetings at the office, sales calls, and other times when you are engaging with someone.

    Challenge yourself to remember things like the color of a person's shirt, what kind of jewelry they were wearing, their full name, or other details you would not normally care about.

    For me, memory works like a muscle. The more I exercise it, the better and stronger it gets.

  • Read. I've found that spending some time reading an actual printed (hardcover or paperback) book helps my memory. There's no book in particular that I suggest you use for this purpose—just read something that's not on a screen. I don't have science to back this up this suggestion, but I can tell you that the more time I spend exercising my brain, the better it “stretches” when I need it to. I have also spent time solving math problems to enhance my ability to remember details.

My final tip for this section is that when you have short breaks, take a few minutes to record your thoughts. I do this in one of two ways: by writing down the details I need to remember or by using a voice-recording app on my phone.

When Claire badged me to floor 18 in the elevator, I whipped out my phone and hit the recording app so I could speak all the details I could remember into the program. This serves two purposes. First it helps me with my reporting later. More importantly, I find that when I say the details out loud, it helps me recall them later.

My quick recording went like this:

  • Claire Farclay. About 5 feet, 4 inches, blonde, medium-build security guard wearing white shirt, badge, black pants. Badge on left breast area. Pictures of two dogs at security desk. Used clipboard. Build rapport by praising that she followed procedures. Badged me to 18 using white HID badge she had clipped to a retractable lanyard on her right hip. Code she entered into elevator pad was 4381.

I just recalled those details from memory even though “The 18th-Floor Escapade” took place more than two years ago. That's how powerful this is for me now.

The next arrow to add to your quiver for successful pretexting is support.

Principle Five: Getting Support for Pretexting

I want you to stop and picture the pretext I have been using in this chapter: a safety auditor for a corporation. Now answer these questions:

  • What would a safety auditor wear?
  • What tools or supplies would a safety auditor have?
  • Is there any special knowledge a safety auditor would need to have?

The answers to these questions are the basis for this section. Let's consider each one separately so we can clearly see how this principle plays out.

Q: What would a safety auditor wear?
A: I've found that these types of auditors generally wear khakis or jeans, a button-up shirt, and sneakers or work boots. They are clean-cut.
Q: What tools or supplies would a safety auditor have?
A: In my research, I discovered that they have a camera, phone, clipboard, pens and markers, paper, a checklist, and sometimes a measuring tape (depending on the job).
Q: Is there any special knowledge a safety auditor would need to have?
A: The answer to that question might require a few other questions being anwered. As a safety auditor do I need to understand how fire extinguishers work? Do I need to understand how fire doors, alarms, or other aspects of the building work? Or is it okay that I am there to just check things off a list? Additionally, what should I know about the company I am trying to gain access to? What should I know about the company that I am pretending to be a part of?

I was once breaking into a building with Michele, and a security guard to whom I had given a fake business card asked me where I lived because he'd never heard of my company. I wasn't expecting that question, so I pointed to the west and said, “Oh, I live over in that direction.”

The guard replied, “In the industrial sector? Where did you find housing there?”

I realized that I was about to get caught, so I said, “Oh, I meant past the industrial sector. You know, in the housing past that?”

“I am sorry, sir. I don't mean to be a jerk, but your business card says, ‘Family Owned for 20 years,’ and you don't even know the area where you live?” the guard questioned respectfully.

My fatal flaw here was not having enough knowledge of my pretext area that I could answer questions intelligently.

I could not have foreseen that I would be asked this question, so the guard definitely gets points for being aware, but I didn't make that mistake again. From then on, if I had a business card that said I had been there for some period, my supporting information was ready to prove that true.

More often than not, though, I'd rather make things easy, so I allow my pretext to be that I am new in the area or from out of town. That gives me freedom to not have to know everything about the location where I am.

In “The 18th-Floor Escapade,” I found that having the clipboard enabled me to not just look the part, but it also allowed me to have the very thing I needed to support my detail recording. Because I looked the part, Claire had no reason to question my motives.

And that brings us to the last principle: execution. It almost seems if you follow the five preceding principles, the very last one should be easier to implement.

Principle Six: Executing the Pretext

Execution of the pretext means so much more than just applying the first five principles. By the time you're executing the pretext, nerves, unforeseen events, and—the wildcard—other humans are thrown into the mix, which means anything can happen.

I have been doing this now for close to a decade, and I still get nervous for every gig—whether it's walking into a place or picking up the phone or clicking Send on an email. Did I forget something? Will they catch me? Will I fail? These questions always race through my mind as I am starting off.

The following things help me execute the pretext more easily:

  • Practice
  • Stretch and breathe
  • Communicate
  • Do not use a script

It is important to remember that even with all the previous preparation there is still the unknown factor: the very observant employee, the overzealous guard, or the locked door you didn't plan for. In other words, you have to be prepared to be flexible.

Practice

If it is a phishing email, I make sure to send it to myself and some colleagues to get feedback. I also like to have my colleagues click the link or open the document to ensure everything is working. When I'm vishing, I make sure I have all supporting background sounds, information, and details ready on my screen. I also do a test call to ensure my spoofing is working. When I'm SMiShing, I send the message to another cell phone or myself to ensure it is formatted correctly and the link works. And if I'm impersonating my way into a building, I practice my opening lines and make sure I have my details solidly fixed in my mind before I even get in the car. I also ensure all my cameras and any other equipment or tools are working.

As Paul Kelly, a protégé of Dr. Ekman (who was introduced in Chapter 2), once taught me: “Perfect practice makes perfect.” Practice doing it right, so your muscle memory is ready to snap into action.

Practice can make the difference between success and failure. At one of my jobs, after arriving at the location and grabbing my equipment from the trunk, I flipped the switch and discovered the camera had dead batteries. I ended up having to use the camera on my cell phone. I remember walking into that building, and all I could think about was whether my phone would work, if it would keep recording, or if it would be huge tell that I was holding my phone in a very conspicuous way.

Stretch and Breathe

This might sound silly, but I spend just a few moments taking some deep breaths and stretching. Additionally, depending on how nervous I am, I might spend a few minutes in a power pose to help build some confidence before I execute my pretext and attack. (You'll read more about power poses in Chapter 8.)

Communicate

As a professional social engineer, I make sure I communicate to the proper degree with my client. For example, the day before I launch a phishing campaign, I tell our point of contact that I am phishing the next day. (Of course, if I'm running a full black-box pen test, I only communicate this information after completion.) I do the same for vishing campaigns. This is especially important when I'm doing an impersonation gig. I will make sure my point of contact knows when it will occur, so that if there are complications, there is someone I can contact.

I got caught during one engagement. Well, that's not entirely true—the client wanted me to tell security that I was a pen tester after I had been successful. I told the client repeatedly that this was a terrible idea, but they insisted. It went something like this:

  • After successfully walking through security as a trash compactor repairman and gaining access to the whole facility unsupervised, I was leaving and said, “Sir, I just need to tell you before I leave, my name is not Paul as my ID says. It is Chris, and I am what you call a pen tester. I was testing the security of your building and the policies for entry.”
  • As I spoke I saw the security guard's face change to anger, and his hand went to his side where he had was a stun gun. He said, “You are what? Am I getting fired?”
  • I tried to calm him down by saying, “Sir, no one is getting fired. This was just a test, so we can help your company employ new policies to tighten security.”
  • However, he was already on his radio, calling the head of security, and he hit a button to lock the mantrap so I couldn't escape.
  • The head of security came out. The man I had just duped explained the situation in a very derogatory and angry way. I tried to interject, and the guard snapped, “No one is talking to you, Paul or Chris or whatever you say your name is.”
  • I said, “I'm going to pull a letter out of my pocket that you should read.” I handed them the “Get out of jail free” letter, as I like to call it. This letter is written by the client company to detail who I am, what I am doing, and that I have permission to do it. It also gives one or two contact numbers of people to back up my story.
  • After reading the letter, the head of security said, “How do I know this letter isn't a lie? Huh, Chris?”
  • “Well, that is a very good question. And to be honest, you don't. But just call one of those contact people and this will all get cleared up.”, I said in my most agreeable voice.
  • “I am not calling anyone on this paper. For all I know, this number rings to your crime buddies out in the van.” (I thought, “Darn, that is a good point, and also a great idea for a future gig. Thanks Mr. Head of Security”.)
  • He continued, “I'm calling someone I know in corporate.” He picked up the phone and dialed an extension. He rattled off the story and then asked, “Do you know anything about this?”
  • I could overhear the voice on the end of the line said, “I don't know anything about a pen test. Call the cops.”
  • I was escorted to and then locked into a utility closet. (I'm not even kidding.) Fortunately, in their haste, the guards left me with my cell phone and my lock picks. In a few minutes, I was out of the closet, had unlocked the office door, and was sitting in the hallway calling my point of contact to tell him to get this fixed now! And am I thankful I called him the night before to ensure he was going to be in. A few minutes later, this was all squared away, and I was leaving free and un-tased.

As this story illustrates, you have to make sure you communicate with the right people about the right things at the right time. I know this is vague, but that's because the requirements and rules change per job, per task, and per client. Some clients require significantly more hand-holding than others. Just remember, you are an SE professional, so you must ensure your clients are happy.

Do Not Use a Script

This advice is mainly directed to you Cs on the DISC chart, who want a ton of detail and every step outlined. (Chapter 3 covers the DISC profile and what a C is in detail.) Having a script, whether for vishing or impersonation, removes your ability to be dynamic. I guarantee you one thing: nothing will go exactly as planned. Having the ability to be dynamic gives you a leg up and a higher success ratio.

Summary

I suggest you spend time reviewing the six principles of pretexting, so you can better perfect them. Remember that each principle builds on the next principle and will help you become a stronger social engineer in the process.

Planning your goals efficiently can help you come up with reality-based pretexts that keep the target in beta mode (refer to Dr. Langer's research in Chapter 1). Using reality rather than all fiction will make it easier for you to stay in pretext and make it easier for the target to believe you. Having your pretext firmly based in reality helps you determine how far you should go for that particular job, so your effort is at the right level and not too much or too little. Keeping it simple also helps boost your memory retention for not only the facts of your pretext but also whatever information you obtain (so you can recall it easier). All this planning makes it easy to decide what outfits, gear, and tech you need to support your pretext. If you have made it this far, you can easily execute the pretext.

Please remember that your pretext can make or break your whole engagement. Just imagine if you had gone with me to those warehouses, but you had shown up with a smart business suit and a briefcase. Does that fit the identity of a trash compactor repairman?

That example might be extreme, but I want you to get the point. If you start to sense that you are getting caught, you will get nervous. And nervousness will wreck your smoothness, your memory, and your ability to think quickly.

The pretext, when done right, helps answer those four questions I spoke about in Chapter 3: Who are you, what do you want, are you a threat, and how long will this take? But there is another purpose of those questions that needs to be addressed, which is the topic of Chapter 5, and it has to do with building rapport.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.190.93