Social engineering is carried out using several strategies — some strategies are used for influencing, elicitation and more. One of the most effective strategies that I use is called Social Proof. Effective use of the Social Proof strategy for social engineering can be very useful. In this video, I describe Social Proof and a few ways to execute it.
I hope you enjoy and please Like, Share and Subscribe!
About The Author: Jeremiah Talamantes
Jeremiah is the Founder and President of RedTeam Security -- a boutique information security firm specializing in Social Engineering, Penetration Testing, Physical Intrusion and Red Teaming. Jeremiah holds two patents; one for his proprietary methodology for red teaming called, Full-Force Red Teaming®. He has nearly 20 years in information security and is the author of the Social Engineer's Playbook: A Practical Guide to Pretexting.
More posts by Jeremiah Talamantes