Social-Engineering-Tactics
Social-Engineering-Tactics copied to clipboard
Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
Social Engineering Tactics
Welcome to the Social Engineering Tactics repository! This repo. contains ** real-world social engineering tactics** used for manipulation, persuasion, and deception. Stay aware and stay secure!

📌 Categories of Social Engineering
- Psychological Manipulation 🧠
- Building Trust & Rapport 🤝
- Elicitation Techniques 🎯
- Impersonation & Pretexting 🎭
- Persuasion Tactics 🏆
- Digital Social Engineering 🌐
- Physical Social Engineering 🏢
- Advanced Social Engineering 🚨
🧠 Psychological Manipulation Tactics
- Reciprocity Pressure – "Here’s a free sample, now could you buy something?"
- Authority Influence – "The CEO asked me to collect this data from you."
- Social Proof Manipulation – "Everyone else has done it—why not you?"
- Scarcity Effect – "Only 2 spots left! Hurry!"
- Commitment & Consistency – "You signed up for a free trial, why not the full plan?"
- Urgency Triggers – "Act now before it’s too late!"
- Fear-Based Persuasion – "If you don’t update now, you’ll lose your account."
- Guilt-Inducing Requests – "I helped you before, can’t you return the favor?"
- Exploiting Sympathy – "I lost my wallet, can you lend me money?"
- False Sense of Obligation – "You’re my best friend; I know you’ll help me out."
🤝 Building Trust & Rapport
- Mirroring & Matching – Copying someone’s gestures to seem relatable.
- Compliment-Based Influence – "You’re amazing at this! Can you help me?"
- Artificial Common Interests – "Oh, you love photography too? So do I!"
- Using Humor to Disarm – Joking before making a request.
- Strategic Name-Dropping – "John said you’re the best person to ask."
- Fake Shared Experiences – "I remember you from that event last year!"
- Using Authority Figures – "Your boss recommended I reach out."
- Selective Vulnerability – "I’m new here, could you guide me?"
- Forced Familiarity – Acting as if you already know someone.
- Using Social Media Info – "I loved your recent post on LinkedIn!"
🎯 Elicitation Techniques
- Open-Ended Questioning – "How do you handle password resets?"
- False Confession Baiting – "I already know, but I need confirmation."
- Strategic Pauses – Staying silent to make the other person talk.
- Flattery for Disclosure – "You know so much about this, tell me more!"
- Fake Confidentiality – "Just between us, how does your system work?"
- Reverse Psychology – "You probably don’t have access to this, right?"
- Implying False Info – "Your office is on the 3rd floor, right?"
- Playing Dumb – "I don’t understand, can you explain in detail?"
- Fake Surveys for Data – "Take our quick security survey for a reward!"
- Gossiping to Extract Info – "I heard something about a new project… do you know anything?"
🎭 Impersonation & Pretexting
- Posing as IT Support – "We need your login details to fix an issue."
- Pretending to Be Lost – "Hey, do you work here? Can you show me around?"
- Impersonating an Authority – "I’m from corporate security; I need access."
- Calling as a “New Employee” – "Hey, I’m new. What’s the WiFi password?"
- Acting as a Delivery Person – "I have a package for the manager—can I drop it off inside?"
- Fake Job Offers – "We’d like to hire you; just send us your ID and bank details."
- Acting as a Journalist – "I’m writing an article—can you share internal details?"
- Fake Emergency Situations – "Your account is compromised! Confirm details now."
- Pretending to Be an Old Friend – "Hey, remember me from high school?"
- Fake Customer Complaints – "I need my order details; can you verify my account info?"
🌐 Digital Social Engineering
- Fake Phishing Emails – "Your password is expiring, reset now!"
- Social Media Manipulation – Pretending to be someone else online.
- Fake Online Contests – "Win a prize! Enter your details."
- Creating False LinkedIn Job Offers – "We have an open position; send us your CV."
- Fake Friend Requests – Adding someone to gain personal details.
🏢 Physical Social Engineering
- Tailgating into Secure Locations – Following someone through a door.
- Dumpster Diving for Data – Looking through trash for useful info.
- Shoulder Surfing for Passwords – Watching someone type their password.
- Posing as Maintenance Staff – "I need to fix the WiFi in your office."
- Using Fake IDs for Entry – Showing a fake badge to enter.
🚨 Advanced Social Engineering
- Fake Police or Government Calls – "This is the IRS. We need your details."
- Fake HR Emails – "Update your employee records here."
- Fake LinkedIn Recruiter Messages – "We have a job opening for you!"
- Fake Bank Calls – "We detected suspicious activity—verify your info."
- Fake Social Media Giveaways – "You’ve won! Enter your details here."
🛡️ How to Defend Against Social Engineering
- Always verify identities before sharing information.
- Be skeptical of urgent or emotionally charged requests.
- Use multi-factor authentication (MFA) to protect accounts.
- Limit social media sharing of personal details.
- Train employees & teams on security awareness.