PART VI: INFLUENCING OTHERS
I. Influence Tactics
A. Reciprocation
1. Obligation
2. Concession
B. Scarcity
C. Authority
D. Commitment and Consistency
E. Liking
F. Consensus or Social Proof
II. Framing
III. Manipulation of Incentives
PART VII: SOCIAL ENGINEERING TOOLS
I. Physical
A. Lock Picking and Shims
B. Cameras
C. GPS Tracker
D. Pen Recorder
E. RF Bug Kits
II. Computer Based
A. Maltego
B. Maltego Mesh
C. Social Engineer Toolkit (SET)
D. Common User Passwords Profiler (CUPP)
E. Who’s Your Daddy Password Profiler (WYD)
III. Phone
A. Caller ID Spoofing
viaThe Official Social Engineering Framework – Social Engineering Framework.