Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Search results


  1. Hiotcek

    SE Why A Proof Of Purchase Is Requested And How To Bypass It.

    Why A Proof Of Purchase Is Requested And How To Bypass It. There's no doubt that social engineering companies for refunds and replacement Items, can be an arduous task at the best of times, particularly when "representatives work strictly by the book when assessing and processing claims". As an...
  2. Hiotcek

    SE IDENTIFY HOW A COMPANY WORKS

    Identify How A Company Operates & Manages Claims. Regardless If you're social engineering your local computer shop (that only has a handful of employees) by physically attending the customer service counter and tricking one worker with the sealed box method for a replacement Item, or SEing the...
  3. Hiotcek

    SE What To Expect With Carriers And How To Protect Your SE.

    What To Expect With Carriers And How To Protect Your SE. Let's face It, we don't live In a perfect world and never will. When performing a certain task, there's always "at least one obstacle" that needs to be tackled and sorted out before things can start moving forward, and this certainly...
  4. Hiotcek

    SE MISSING ITEM TAMPERED METHOD

    The Box/Package Was Tampered With & The Item Was Missing With regard to social engineering online stores that utilize a carrier partner to service their deliveries, the objective Is to deceive their representatives to credit accounts or dispatch replacement Items at their expense, thereby the...
  5. Hiotcek

    SE The Reasons Why The So-Called FTID Method Will Fail.

    The Reasons Why The So-Called FTID Method Will Fail. If you've just stumbled across this article from a beginner's social engineering standpoint, and have either just started your career or only performed a handful of SEs, I'd say It's very safe to assume that you're at a loss as to what the...
  6. Hiotcek

    SE Social Engineering Checklist For Every SE Performed.

    Social Engineering Checklist For Every SE Performed. Every time you're planning to social engineer a company, be It a small business that only has a handful of employees who're processing a few orders here and there, or perhaps online stores on a very large scale to the likes of (obviously)...
  7. Hiotcek

    SE SE SUCCESS INDICATORS

    Indications That Your SE Is On Its Way To Success. As an SE'er yourself, who's been social engineering online retailers In just about every capacity for quite a number of years, or perhaps you're offering a refund service to those who don't have the skill set to perform a given SE on their own...
  8. Hiotcek

    SE IN DEPTH METHOD SELECTION

    How To Effectively Select Your Method With Every SE. If you're a regular reader of this blog, you would've sifted through countless articles and tutorials pertaining to different types of "methods" used to deceive representatives Into crediting accounts, and dispatching replacement Items at...
  9. Hiotcek

    SE How To Get A Refund Instead Of A Replacement Item.

    How To Get A Refund Instead Of A Replacement Item. When you hit a Google search with social engineering as the keywords, there will be countless pages returned, with the majority of sources defining It as obtaining confidential Information such as usernames & passwords, bank account details and...
  10. Hiotcek

    SE Why Tracking Cannot Be Used To Confirm Deliveries.

    Why Tracking Cannot Be Used To Confirm Deliveries. Social engineering entails many different types of attack vectors, ranging from grabbing someone's full name and date of birth over the phone by pretending to be a customer service rep of their credit card provider who needs the credentials for...
  11. Hiotcek

    SE WHY SE'S ARE EASILY APPROVED

    The Reasons Some SEs Are Approved Quickly & Easily. So you've been social engineering for many years to date, and operate on an Intermediate to advanced level and have hit countless companies to the likes of ASOS, Logitech and Amazon by manipulating their representatives Into performing an...
  12. Hiotcek

    SE METHODS PROS AND CONS

    The Advantages & Disadvantages Of Traditional Methods. In order to successfully SE a company by tricking their representatives to dispatch a replacement Item while you still get to keep the original, or credit your account for the full cost of the purchased Item at their expense, there's one...
  13. Hiotcek

    SE THE SEALED BOX METHOD

    Returning The Box As Though It Contains The Original Item. On the grounds that you've purchased and received an Item by ordering It online from a given company and want to social engineer them for a refund or replacement, there are many methods you can use such as (but not limited to) the DNA...
  14. Hiotcek

    SE CARRIER INSPECTING PACKAGES

    Carrier Driver Inspecting The Package At The Collection Point. No matter what type of social engineer you are, be It a refunder who's been In the scene for many years to date and offering your services to those who're less experienced In the art of "company manipulation and exploitation" or...
  15. Hiotcek

    SE Effectively Prepare The Missing Item & Partial Methods.

    Effectively Prepare The Missing Item & Partial Methods. With regard to "company manipulation and exploitation", whereby you're hitting online stores to the likes of Amazon, John Lewis, ASOS and so forth for refunds and replacement Items, there's one particular element named a "method" that...
  16. Hiotcek

    SE Get A Refund Or Replacement By Only Using A Serial Number.

    Get A Refund Or Replacement By Only Using A Serial Number. If you're somewhat new to the social engineering sector, perhaps only familiar with the old-school type of SEing consisting of (but not limited to) pretexting, tailgating, spear phishing, quid pro quo and few others, I'd say It's very...
  17. Hiotcek

    SE Effectively Edit Image Metadata Without Raising Suspicion.

    Effectively Edit Image Metadata Without Raising Suspicion. Every time you're In need of a product or a service, be It buying a new desktop computer with the very latest GPU to play your favorite games, or grabbing a pair of Nike Air Max trainers to wear at your aerobics session every Thursday...
  18. Hiotcek

    SE The Best Approach To Safely Sell Your SE'd Items.

    The Best Approach To Safely Sell Your SE'd Items. Regardless of the type of social engineer you are, be It on an Intermediate or advanced level who's been hitting online stores for many years to date with minimal complications, or perhaps a beginner with only a few weeks of experience and need...
  19. Hiotcek

    SE ADVANCED REPLACEMENT

    The Company Dispatches A Replacement Item In Advance. When hitting online retailers to the likes of Zalando, Nike and of course the largest eCommerce company being Amazon, they're all exploitable by tricking their representatives to perform an action that they're not supposed to do- In this...
  20. Hiotcek

    SE ADVANCED RESEARCHING

    The Comprehensive Handbook Of SEing Researching. Each and every social engineering attack, differs to some degree and also has Its fair share of complexities when hitting one company to the next for refunds and replacement Items. Be It SEing your local computer store that has only a handful of...
shape1
shape2
shape3
shape4
shape7
shape8
Top