Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Search results


  1. Hiotcek

    SE THE GIFT METHOD

    Say That The Item Was Received As A Gift. Whether you're an advanced SE'er or looking to get Into the scene, you may find this a little hard to believe, but social engineering what first recognized In the late 1800s, but It's not to say that It didn't exist a lot earlier. You see, people have...
  2. Hiotcek

    SE WRONG ITEM RECEIVED METHOD

    Claim That An Incorrect Item Was Sent. Let's face It, we don't live In a perfect world and to be honest, we never will. Be It at work manually processing Invoices for clients or working on a computer project at home, human error Is Inevitable, regardless how focused you are at the time. The same...
  3. Hiotcek

    SE FAKE RECEIPT METHOD

    Provide A Fake Receipt To Get A Refund Or Replacement. On the grounds that you have the funds to purchase an Item that you plan to social engineer from an online company such as Best Buy, Walmart or Amazon, there are a number of methods to choose from- some of which are flexible with the Item In...
  4. Hiotcek

    SE SOCIAL ENGINEERING DEFINED

    Social Engineering Defined And How It's Used. When you navigate on the net and hit a Google search with the terms "social engineering definition", there are countless pages returned, some of which are plagiarized, and others provide Its meaning In their very own wording. Or do they In fact...
  5. Hiotcek

    SE How To Execute The Social Engineering Attack Effectively.

    How To Execute The Social Engineering Attack Effectively. There's a lot happening In the complex mind of the social engineer, who's constantly facing challenges to get what he's after, such as SEing an ISP to get his victim's login credentials, or hitting a major online retailer for a 3,000$...
  6. Hiotcek

    SE CEASE AND DESIST NOTICE

    Cease And Desist- A Request To Stop The SE. Regardless of whether you're social engineering a company on a very large scale such as Nike, by manipulating the representative to Issue a refund for a pair of trainers that you didn't order to begin with, or your local computer store to replace the...
  7. Hiotcek

    SE SE'ING ENCYCLOPEDIA

    If you've ever wanted to know every term and method relative to social engineering, Irrespective of your level of experience, then you've come to the right place. This SEing encyclopedia, has everything you need pertaining to common terms and methods that're used In today's world of exploiting...
  8. Hiotcek

    SE THE TYPES OF SE'ERS

    The Different Types Of Social Engineers. When you navigate on the net and lookup the definition of the term "social engineering", It's predominantly defined as "tricking someone Into giving up confidential Information", or some variant of similar meaning. Whilst this Is certainly true and...
  9. Hiotcek

    SE CHOOSE THE RIGHT METHOD

    How To Choose The Right Social Engineering Method. The term "social engineering", Is rather broad and covers an extensive amount of methods and attack vectors, such as grabbing confidential Information from an employee In the head office of a Fortune 500 company, or SEing the representative at...
  10. Hiotcek

    SE THE FTID METHOD

    Refund An Item By Manipulating The Package. Before I begin with this method, I'd like to make one thing perfectly clear- It's flawed In many areas, and contains an array of Inconsistencies that ultimately result In a failed SE. So why am I documenting an article on a method that's not likely to...
  11. Hiotcek

    SE MUST SE WITH CONFIDENCE

    A Very High Level Of Confidence Makes A Huge Difference. Everything you do during your day-to-day activities, be It a brainstorming session at your scheduled Monday morning meeting at work, or simply attending a birthday party with a group of friends, you may not realize It but there's always...
  12. Hiotcek

    SE LOCKED ACCOUNTS DEFINED

    Understand & How To Circumvent Locked Online Accounts. Elite social engineers who've been exploiting the human firewall by way of manipulating the person on the other end to perform an action they're not supposed to do, or getting the representative of an online retailer to Issue a refund for a...
  13. Hiotcek

    SE SE'ING USING DRY ICE

    How To Use Dry Ice When Boxing A Company. When social engineering an online retailer for a refund or replacement of an Item that you've either already purchased, or only have Its serial number that's still under warranty, there are quite a number of methods that you can utilize. For example, In...
  14. Hiotcek

    SE Getting A Refund By SEing PayPal With A Chargeback.

    Getting A Refund By SEing PayPal With A Chargeback. Pertaining to social engineering online retailers on a large scale such as Amazon, Logitech, John Lewis and so forth, there are a couple of options available- either obtain a replacement Item or request a refund. Unless you're keen on keeping...
  15. Hiotcek

    SE LEAKING BATTERY METHOD

    How To Effectively Use The Leaking Battery Method. Social engineering methods and techniques pertaining to Item refunds and replacements, each differ In the way they're utilized against companies. Whilst some methods, such as the "DNA (Did Not Arrive)" are universal and can be used with just...
  16. Hiotcek

    SE ASKED TO SIGN A STAT DEC

    The Company Requests To Sign A Statutory Declaration. The fact Is, we all want to have the top of the range cell phones, big screen TVs or perhaps the awesome 3,000$ gaming laptop advertised by an online retailer however, not everyone can afford to purchase such Items and even If they could, why...
  17. Hiotcek

    SE UNKNOWN USB STICKS

    Do Not Plug In Unknown USB/Removable Devices. Before I begin, this article relates to "protecting your business from falling victim to being compromised by a malicious USB Stick". If you're computer savvy or have experience In the hacking sector for many years to date, then you'll certainly be...
  18. Hiotcek

    SE THE SE IS A LEGIT CLAIM

    Take Every SE That You Perform As A Legit Claim. During the course of every SE pertaining to companies when social engineering them for a refund or replacement of an Item, the SE'er will predominantly think of the possibility of Investigations opened, accounts closed (due to too many claims)...
  19. Hiotcek

    SE THE DISCOUNT ITEMS METHOD

    A Van Pulling Over Offering Discount Items. Whether you're new to the social engineering sector or have been In the scene for quite a number of years to date, there's very little doubt that the preferred gateways to perform your attacks Is via a phone call, SEing companies online or simply using...
  20. Hiotcek

    SE USING CATFISHING TO SE

    Using Catfishing To SE By Fabricating An Identity. When you perform social engineering on your victim with the Intention to grab as many Identifiable and confidential details as possible, It's usually done through the most common gateways, such as over the phone, via email or directly during...
shape1
shape2
shape3
shape4
shape7
shape8
Top