Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

SpoofApp

SpoofCard
spoofing
Caller ID
caller ID
SpyHawk SuperTrak GPS Worldwide Super Trackstick USB Data Logger
reading data
stamp collection
steepled fingers
Stevens, Tom G., self-confidence
stoic eyes
stories as direct instructions
subliminal framing
suggestibility of target
increasing
pen clicks
surprise
fear and
symbols of authority
sympathetic approach to interrogation
T
tail-gating
tapping/drumming fingers
targets
attention, holding
baseline
behavior and your emotion
emotional attachments
environment, controlling
intimidation
personal attachments
powerlessness
suggestibility, increasing
undermining beliefs
tech support, pretexting
Teensy HID attack vector
telelphone use
telephone-based tools
Asterisk
Caller ID spoofing
scripts
SpoofApp
SpoofCard
Telephone Records and Privacy Protection Act of 2006
tense switches
tension wrenches for lock picking
The Art of Deception (Mitnick)
The Expression of the Emotions in Man and Animals (Darwin)
The Real Hustle
theft, employee theft
theme development
Theme Park Scandal
Thriving Office
tip jar salting
Tomkins, Silvan
tools
GPS Tracker
online
Maltego
SET (Social Engineer Toolkit)
password profilers
physical
cameras
lock picks
recording devices
practice
pretexting
telephone-based
Asterisk
Caller ID spoofing
scripts
SpoofApp
SpoofCard
Top Secret 1 case study
Top Secret 2 case study
torture, framing and
Tostitos logo
touching objects by kinesthetic thinkers
touching self
transactional model of communications, Balmund, D.C.
trash
dumpster diving pointers
shredded documents
valuable things
Tupperware parties
Turtles All the Way Down (DeLozier and Grinder)
TV reality shows, framing and
U
Ultimate Voice, NLP and
uncertainty, social proof and
undermining beliefs
Unmasking the Face (Ekman)
updating software
USB drive acceptance, communication and
user sites
V
valuable things thrown away
value of information
verb tense
verbal communication
visual framing
visual thinkers
sub-modalities
vocal tone matching
voice
interrogation and
NLP and
Vontu, confidential data in email
W
warm leads
Weaver, Warren. See also Shannon-Weaver model
web attack vector, SET (Social Engineer Toolkit)
websites
background checkers
ICanStalkU.com
information collection
lock picking
microsoft.com, PDF files
personal websites
public reports
public servers
search engines
social-engineer.org
social media
user sites
wedging the alibi approach to interrogation
Westbury, Chris
white color association
Whois
Winston, Joel
Withgott, Margaret
Wizards Project
Wong, Kelvie
words, interrogation and
workplace friends
WYD (Who’s Your Daddy) profiling software
Y
yellow color association
Z
Zinbarg, Richard E.
zygomaticus major muscle in smiling

You might also like