HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

Social Engineering & Phishing

0%
Lessons
Psychology & OSINT
01Social Engineering Principles
50 min
02OSINT Hygiene (Defensive)
55 min
Phishing
03Phishing Infrastructure (Defensive Model)
58 min
04Phishing Simulations (GoPhish) — Responsible Program
62 min
05Phishing Proxies (Evilginx2 / AiTM) — How MFA Gets Bypassed
65 min
Pretexting
06Pretexting Scenarios (Defensive)
44 min
07Vishing & Smishing (Defensive)
50 min
Credential Harvesting
08LLMNR/NBT-NS Poisoning (Defensive)
65 min
09Office Macros & Credential Theft (Defensive)
58 min
Reporting & Defense
10Write a Campaign Report (Awareness Simulation)
52 min
11Awareness & Countermeasures
48 min

Lesson 01

Social Engineering Principles

Understand the psychological levers adversaries exploit and the defensive habits that break the loop: verification, process, and phishing-resistant controls.

Social Engineering & Phishing/Social Engineering Principles

Social Engineering Principles

Social engineering is the set of techniques adversaries use to influence people into revealing sensitive information or performing actions that weaken security. It targets humans — the part of the system that can be pressured, rushed, or socially coerced.

This course focuses on defensive understanding: how these attacks work, how to recognize the psychological trigger being used, and what practical verification steps and technical controls reduce risk.

A responsible social engineering engagement cycle: scope and rules, research, pretext design, measurement, and improvements.
A professional SE engagement should always close the loop with concrete mitigations and learning.

Cialdini’s 6 influence principles

Robert Cialdini identified six universal influence levers that attackers can abuse:

A grid of the six influence triggers (Cialdini) such as authority and urgency, with examples of cues they exploit.
Defense trick: identify the trigger (authority, urgency, etc.), then switch to verification out-of-band.
PrincipleDescriptionCommon manipulation pattern
ReciprocityWe feel pressure to return favorsA request framed as “I helped you, now you should help me”
Commitment/ConsistencyWe try to stay consistent with past actionsStart with a tiny, harmless ask, then escalate
Social proofWe follow what others appear to do“Everyone already did it” or “most employees have complied”
AuthorityWe comply with perceived authorityImpersonation of leadership, IT, finance, or auditors
LikingWe help people we like or identify withRapport-building before a sensitive request
Scarcity/UrgencyWe act faster under time pressureShort deadlines, threats of consequences, “act now” framing
Cialdini psychologie influence

Common cognitive biases attackers exploit

Authority bias

People tend to comply with someone they perceive as legitimate authority. That’s why impersonation of “IT”, “Finance”, or “Leadership” is so common.

Urgency and fear

Under stress, the brain shortcuts critical thinking. “Your account is compromised — act now” aims to trigger emotion before analysis.

Over-trust in familiar cues

We trust what feels familiar: logos, professional language, plausible context.

Cognitive overload

An overloaded employee handling 200 emails/day is more likely to misjudge a suspicious message.

Types of social engineering attacks

TypeVectorExample (high-level)
PhishingEmailGeneric message pushing an urgent action via a link
Spear phishingTargeted emailPersonalized context to look internal/legitimate
WhalingExecutive targetingHigh-impact request aimed at decision-makers
VishingPhoneImpersonation + pressure over a live call
SmishingSMSShort message with a link or callback request
PretextingAnyA believable story + role to justify a sensitive ask
BaitingPhysical/digitalA “tempting” lure that triggers unsafe behavior
Quid pro quoPhone/emailOffer of help in exchange for sensitive action
phishing spear phishing pretexting vishing

The SE engagement cycle (defensive view)

An authorized awareness simulation (or a real-world attacker) often follows a cycle like this:

1. Reconnaissance → Understand environment and likely targets
2. Preparation    → Build a story and test assumptions (authorized scope only)
3. Approach       → Initial contact (email/call/message)
4. Outcome        → Measure behavior (click, report, escalation path)
5. Improvements   → Document evidence and deploy mitigations

Legal and ethical guardrails (GDPR + authorization)

⚠️ Always work within an explicitly authorized legal framework.

Before any awareness simulation:

  • Get written authorization (Rules of Engagement)
  • Define the scope (who can be included, which vectors are allowed)
  • Define limits (no real credential collection, no real compromise)
  • Plan an emergency stop mechanism if someone is distressed or harmed
legal Rules of Engagement GDPR

Flashcards

Flashcards
Flashcard

Which Cialdini principle is used when a message pressures you with a short deadline?

Flashcard

What’s the difference between phishing and spear phishing?

Flashcard

What is pretexting?

Practice exercise (defensive)

  1. Analyze 3 real phishing examples (from public datasets)
  2. For each: which Cialdini principle is being used?
  3. Which cognitive bias is primarily targeted?
  4. Identify indicators (sender domain, reply-to, URLs, urgency language)
  5. Write a mini “awareness note” explaining the cues and what to do next
Exercises

Exercise 1 — Message analysis checklist

Create a simple checklist (max 6 criteria) to analyze a suspicious email/SMS/call. Apply it to 3 examples and conclude: risk, warning signals, recommended action.

Open Questions

Why do Cialdini principles still work even on “trained” people?

Next Lesson

You now understand the psychological foundations of social engineering. The next lesson moves to defensive OSINT: learning how publicly available information becomes risk, and how to audit your organization's exposure.

Next: OSINT Hygiene (Defensive)

Hands-on challenge

Practice what you learned — run it on your machine.

Do the challenge →

You're on a free lesson

Ready to go further?

Unlock all courses, exercises, real-world scenarios and flashcards — everything to build real skills.

Unlock full access →

No commitment · Cancel anytime

Sign in to track your progress.

Sign in to validate →

10 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →