Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Search results


  1. Hiotcek

    SE How To Social Engineer Items Of High Value.

    How To Social Engineer Items Of High Value. In the complex world of social engineering, every SE'er differs to some degree and no two are ever alike. "Some are gifted In the art of human hacking, whereby they know precisely what to do with every situation that comes their way" and seldom (If...
  2. Hiotcek

    SE Everything You Need To Know About A Police Report.

    Everything You Need To Know About A Police Report. If you're an Intermediate or advanced social engineer who's been there, done that with the old school type of SEing, whereby you'd get your victim's password to their Gmail account by sending a malicious link to their email address or remotely...
  3. Hiotcek

    SE The Best Time To Social Engineer Your Target.

    The Best Time To Social Engineer Your Target. Regardless of how similar each social engineering attack vector may seem, no two are the same, hence each and every one will differ to some degree and as such, there's a lot to take Into consideration when deciding who you plan to SE and how you're...
  4. Hiotcek

    SE THE FAULTY ITEM METHOD

    Claim An Item Is Faulty And Receive A Refund Or Replacement. Unlike the usual forms of social engineering that are defined In the majority of security websites and the like, whereby they state that It Involves grabbing confidential Information from unsuspected users or Infecting their PC with...
  5. Hiotcek

    SE SEALED BOX METHOD EVENTS

    What To Expect When Using The Sealed Box Method. With regard to the new breed of human hacking commonly known as "company manipulation and exploitation", whereby social engineers use their skill set to trick representatives Into having their account credited or replacement Items sent free of...
  6. Hiotcek

    SE Your Must-Have Social Engineering Toolkit.

    Your Must-Have Social Engineering Toolkit. If you're a handyman or perhaps work In the building and construction Industry, whereby you're renovating homes by knocking down old bathrooms and kitchens and replacing them with modern designs suited to your customer's needs, you must be well prepared...
  7. Hiotcek

    SE ETHICAL SOCIAL ENGINEERING

    How To Social Engineer In An Ethical Capacity. When you hit a Google search to define the term social engineering, It's mostly referenced as Infecting computer systems with malware to compromise confidential Information, and/or manipulating people to grab their personal details, credit card Info...
  8. Hiotcek

    SE How To Effectively Prepare Your Method Prior To The Attack.

    How To Effectively Prepare Your Method Prior To The Attack. Everything we do In life, has some type of strategic approach to get what we're after or achieve the goal that we're working with at the time, and without generating any thought as to how the task at hand will be accomplished, It's...
  9. Hiotcek

    SE How To Circumvent Photos Taken By The Carrier Driver.

    How To Circumvent Photos Taken By The Carrier Driver. Before I make a start on this article, I'd like to point out that this type of social engineering Is not what you're probably accustomed to doing, such as Infecting computers and networks with the Intention to grab confidential Information...
  10. Hiotcek

    Mail;Pass 12.3k Corp Email Privat 49%

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Hiotcek

    SE LOCATING ITEM SERIAL NUMBERS

    How To Locate Item Serial Numbers. If you're an active social engineer who's been dedicated to the art of human hacking for quite a number of years and part of an online community, namely an Internet forum, you'd predominantly be Involved In discussions relating to the new breed of SEing...
  12. Hiotcek

    SE PREVENT LOCKED ACCOUNTS

    How To Prevent Accounts From Being Locked. There's no doubt that social engineering has Its perks, and If you do the job correctly right from the get-go, you can have just about anything you like without paying a single dime. What I'm referring to of course, Is SEing companies on every level by...
  13. Hiotcek

    SE IDENTIFY A VACANT DROP

    How To Identify A Vacant Drop House. Many social engineers who've been In the scene to the point of reaching an advanced level In exploiting the human firewall, predominantly focus on the very best methods that're suited to the task at hand, and also work on how to effectively use them on their...
  14. Hiotcek

    SE LEARN FROM YOUR MISTAKES

    How To Learn From Your Social Engineering Mistakes. When you look at the big picture of social engineering, be It gaining unauthorized access to a Fortune 500 company to grab confidential documents or hitting a major online store with the Intention to refund a 75 Inch UHD Smart LED TV costing...
  15. Hiotcek

    SE PARTIAL MANUFACTURER METHOD

    Parts Of The Item Were Missing In The Box. If you've been reading my tutorials on this blog, you'd be well-Informed of the array of methods that are used to social engineer companies that operate by delivering goods to their customers via their carrier service. Of course, what I'm referring to...
  16. Hiotcek

    SE What To Expect When Using The DNA Method.

    What To Expect When Using The DNA Method. On the grounds that you've been social engineering online stores to the likes of Logitech and Amazon, you'd be well aware that they all use a carrier service to dispatch and deliver goods to their customers and as such, there are quite a number of...
  17. Hiotcek

    SE Do Not Overthink The Progress Of Your SE.

    Do Not Overthink The Progress Of Your SE. There's a lot going on In the profound mind of the social engineer, and unless you're reading this as an SE'er yourself with years of experience In the art of exploiting the human firewall, It can be very difficult to fathom just how his mind operates...
  18. Hiotcek

    SE THE MISSING ITEM METHOD

    Claim That The Item Was Missing When Delivered. If you've been reading this blog on a regular basis, you'd be well and truly Informed about the different types of methods used when social engineering online stores such as Currys, ASOS, SteelSeries, John Lewis, Zalando and so forth. This of...
  19. Hiotcek

    SE The Impact Of CCTV Cameras When Social Engineering.

    The Impact Of CCTV Cameras When Social Engineering. Without a shadow of a doubt, there are so many factors that need to be taken Into account when you're picking a target to social engineer and regardless of similarities, there are no two exactly alike- each one Is based on Its own merits. In...
  20. Hiotcek

    SE THE FOUR ELEMENTS OF SE'ING

    Every SE Has Four Elements To Complete. For the most part, exploiting the human firewall can be an arduous task to say the very least, with many obstacles to circumvent along the way until It ultimately works In the favor of the SE'er. Unless the person on the other end of the SE Is half-asleep...
shape1
shape2
shape3
shape4
shape7
shape8
Top