Skip to Main Content
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
book

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

by Robin Dreeke, Michele Fincher, Christopher Hadnagy
April 2015
Intermediate to advanced content levelIntermediate to advanced
224 pages
5h 13m
English
Wiley
Content preview from Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Chapter 3Influence and Manipulation

“These aren't the droids you're looking for.”

—Obi-Wan Kenobi in Star Wars Episode IV: A New Hope

You can't really talk about social engineering without talking about influence and manipulation. For all intents and purposes, this is the catalyst for all the decision-making discussed in Chapter 2. As we discovered, people do things for many reasons, but the skilled social engineer understands enough about people to be able to steer the choices made by their targets.

Let's start with definitions. In his first book, Social Engineering: The Art of Human Hacking (Wiley, 2010), Chris defined influence as “the process of getting someone else to want to do, react, think, or believe in the way you want them to.” Manipulation is much the same as influence, but it is typically described as involving devious intent and almost always being in the best interests of the manipulator.

There's one thing I want to mention before we really delve into the depths of this interesting area. Chris and I make a pretty strong distinction between what we call influence and what we call manipulation. Clearly they are very similar, and you've probably heard the terms used interchangeably. Both are actions taken by a person that produces an effect in another. But they have a different feel to them, don't they? You've probably heard about someone who's a “bad influence,” but have you ever heard anyone use the term “good manipulation”? Despite the fact that both things may ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi
Tribe of Hackers Red Team

Tribe of Hackers Red Team

Marcus J. Carey, Jennifer Jin

Publisher Resources

ISBN: 9781118958483Purchase book