Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Search results


  1. Hiotcek

    SE The Impact Of The DNA Method On The Driver & Yourself

    The Impact Of The DNA Method On The Driver & Yourself When used In the right context and to Its full potential, "social engineering Is a very powerful tool" that can achieve just about anything that comes to mind. Be It using the serial number method for a 3,000$ gaming laptop and circumventing...
  2. Hiotcek

    SE How To Social Engineer Articles Of Clothing

    How To Social Engineer Articles Of Clothing The fact Is, every social engineer differs to some degree with the type of products they're looking to SE. Those SE'ers who're tech-heads will (for example) opt for computer monitors, digital cameras, headphones, Apple AirPods, gaming laptops and If...
  3. Hiotcek

    SE Any Company Can Be Exploited And Social Engineered

    Any Company Can Be Exploited And Social Engineered There's no doubt that every social engineering attack vector Is different from one another and even If you've selected the same Item, used a matching method and executed It without variation, It will not be a carbon copy of another SE that...
  4. Hiotcek

    SE The Risks Of SEing Repeatedly Without Care

    The Risks Of SEing Repeatedly Without Care In this day and age, social engineering has taken on a whole new meaning on how attack vectors are executed and the Intentions behind deceiving a given target. For Instance, If you hit a Google search and navigate to (SEing) Internet forums/boards or...
  5. Hiotcek

    SE THE FTID METHOD FACTS

    Why The FTID Is Flawed & Is Not Considered A Method Per Se Regardless If you've been social engineering for months/years, or just started your career In the art of "company manipulation and exploitation", there's no doubt you've come across a few sources pertaining to hitting companies of all...
  6. Hiotcek

    SE THE THREE TYPES OF SE'ERS

    The Three Different Types Of SE'ers In Every Community. In today's standards and expectations of social engineering online retailers by tricking their representatives to credit accounts or Issue replacement Items at their expense, each and every attack vector differs to a certain degree, hence...
  7. Hiotcek

    SE METHODS WITHOUT SIZE & WEIGHT

    Methods That Do Not Require Item Weights & Dimensions. With regard to the new breed of human hacking known as "company manipulation & exploitation", whereby representatives are deceived by social engineers to credit their account for the full cost of the purchased Item, or send out a replacement...
  8. Hiotcek

    SE SEing Events That Cause Significant Complications

    SEing Events That Cause Significant Complications We all want the luxury of buying any product that comes to mind, be It an IPhone 13, a pair of Nike trainers with matching tracksuit pants and hoodie, or a top-end laptop to handle any game you throw at It - It's human nature to keep up with the...
  9. Hiotcek

    SE TIMING EVERY SE ACCORDINGLY

    Plan Each And Every SE With Good Timing There's no doubt that each and every SE performed on every scale, must be done with extreme precision and accuracy to give It the best possible chance of success. Be It a small businesses with less than 100 employees, a mid-sized organization operating...
  10. Hiotcek

    SE Using The DNA Method With The Highest Degree Of Success

    Using The DNA Method With The Highest Degree Of Success Every online (or In-store) retailer you decide to social engineer, be It Wayfair, Zalando, Nike, ASOS and of course Amazon, must be done by thoroughly researching and collecting all factors pertaining to the company's operations. The moment...
  11. Hiotcek

    SE REFUNDS/REPLACEMENTS APPROVED

    What To Expect When Refunds & Replacements Are Approved There's no doubt that social engineering retailers, both In-store and via an online gateway, Involves a lot of physical and mental preparation to get the job done and no matter how well you've executed your attack vector, problematic Issues...
  12. Hiotcek

    SE THE INFECTED ITEM METHOD

    The Item Was Infected With An Object When Purchased Social engineering has been around for centuries and with the advent of technological advancements, particularly the Internet, a lot has changed In the way It's used nowadays, Inclusive of what SE'ers are aiming to achieve with a given attack...
  13. Hiotcek

    SE How To Legitimately Rescue A Failed SE

    How To Legitimately Rescue A Failed SE If you're the type of social engineer who operates on an advanced level, and have been hitting companies like Wayfair, Zalando, Amazon, John Lewis etc by deceiving their representatives to credit your account for a refund, or dispatch a replacement Item...
  14. Hiotcek

    SE How To Effectively Tackle A Claim That's Been Declined

    How To Effectively Tackle A Claim That's Been Declined Those who've been social engineering entities of all shapes & sizes, would know the complexities Involved to circumvent every obstacle that comes their way, to ultimately deceive their target Into performing an action that they're not...
  15. Hiotcek

    SE Social Engineering Methods For Every Beginner.

    Social Engineering Methods For Every Beginner. Social engineering Is a very broad term that covers an extensive range of attack vectors and when It's effectively applied according to the behavior and environment of the target In question, the SEers Intention Is almost guaranteed to succeed. Be...
  16. Hiotcek

    SE Keep A Record Of Each And Every SE Performed

    Keep A Record Of Each And Every SE Performed If you're at the age of taking responsibility for your own personal affairs, such as shopping for groceries at the local mall, paying the electric, water and gas bills and meeting up with family & friends for lunch, you'd need to be well organized...
  17. Hiotcek

    SE Common Reasons Why Methods Fail With Their Items.

    Common Reasons Why Methods Fail With Their Items. The art of exploiting the human firewall, by manipulating the person on the other end to perform an action that they're not supposed to do, can (at times) be an arduous task to get what you're aiming to achieve. Be It gaining unauthorized access...
  18. Hiotcek

    SE Methods & Events That Trigger A Police Report

    Methods & Events That Trigger A Police Report If you've just stumbled across this blog as a social engineer who's been In the game for decades, you'd be well acquainted with the old-school type of attack vectors, such as (but not limited to) "pretexting", "tailgating", "spear phishing", "quid...
  19. Hiotcek

    SE THE DOUBLE DIP METHOD

    Social Engineer An Item Twice From The Same Company As a social engineer yourself, who's been hitting companies on every level by tricking their representatives to credit your account for the full cost of the purchase price or have a replacement sent at no extra cost, the benefits speak for...
  20. Hiotcek

    SE ANONYMOUS SOCIAL ENGINEERING

    How To Effectively Anonymize Your SEing Activities Everything you do In life has an element of risk. Be It travelling to work on the highway at maximum speed, thereby Increasing the chance of an accident due to losing control of your car, or simply crossing the road on a busy street and...
shape1
shape2
shape3
shape4
shape7
shape8
Top