FastSaying

Both social engineering and technical attacks played a big part in what I was able to do. It was a hybrid. I used social engineering when it was appropriate, and exploited technical vulnerabilities when it was appropriate.

Kevin Mitnick

Kevin Mitnick

AbleAppropriateAttacksBigBig PartBothEngineeringExploitedHybridPartPlayedSocialSocial EngineeringTechnicalUsedVulnerabilities

Related Quotes

The key to social engineering is influencing a person to do something that allows the hacker to gain access to information or your network.
— Kevin Mitnick
AccessEngineeringGain
Social engineering is using deception, manipulation and influence to convince a human who has access to a computer system to do something, like click on an attachment in an e-mail.
— Kevin Mitnick
AccessAttachmentClick
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
— Kevin Mitnick
ActionBenefitsDeception
There is no technology today that cannot be defeated by social engineering.
— Frank Abagnale
CannotDefeatedEngineering
Piecemeal social engineering resembles physical engineering in regarding the ends as beyond the province of technology.
— Karl Popper
BeyondEndsEngineering