{"id":8720,"date":"2019-09-03T21:52:32","date_gmt":"2019-09-03T19:52:32","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=8720"},"modified":"2023-08-06T21:44:34","modified_gmt":"2023-08-06T19:44:34","slug":"social-engineering-learn-from-the-best","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/","title":{"rendered":"Social Engineering \u2013 Learn From the Best!"},"content":{"rendered":"\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"8721\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/kevinmitnick\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevinmitnick.jpg\" data-orig-size=\"400,400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"kevinmitnick\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevinmitnick.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevinmitnick.jpg\" alt=\"Kevin David Mitnick, Social Engineering, Hacker, Manipulation\" class=\"wp-image-8721\" width=\"687\" height=\"656\"\/><\/figure>\n\n\n\n<p>It isn\u2019t always necessary to attack by technical means to collect information or to penetrate a system. In many cases, it\u2019s more effective to exploit the human risk factor. To successfully protect yourself and your company from social engineering, you\u2019ve to understand how a social engineer works. And the best way to do this is by listening to the world&#8217;s most wanted hacker Kevin David Mitnick. Nowadays, the former social engineering hacker uses his expert knowledge to advise companies on how to protect themselves against such attacks. This blog entry is based on his bestseller \u201cThe Art of Deception: Controlling the Human Element of Security\u201d. It sheds light on the various techniques of social engineering and enumerates several ways in which you can arm yourself against them. <\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Who&#8217;s This World&#8217;s Most Wanted Hacker?<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Childhood and Adolescence<\/strong><\/h4>\n\n\n\n<p>In 1963, the most wanted hacker, <strong>Kevin David Mitnick<\/strong>, was born in Los Angeles [1]. He grew up with his single mother who worked a lot as a consequence he spent a huge amount of time by himself. But he enjoyed his resulting freedoms. <\/p>\n\n\n\n<p>At the age of 12, Kevin Mitnick found out how to <strong>use the Los Angeles bus network for free<\/strong>. For this, he had to elicit internal company secrets from the bus drivers, such as where to buy the right punch to validate empty tickets. He realized for the first time how useful his outstanding talent in manipulation could be. <\/p>\n\n\n\n<p>In his high school years, Kevin Mitnick met a classmate who introduced him to the art of <strong>phone phreaking<\/strong>. This is a type of hacking where the attacker explores the telephone network by exploiting telephone systems and employees of telephone companies. The two of them spent a lot of time using the telephone network for their amusement and making free calls. <\/p>\n\n\n\n<p>After graduating from high school, Kevin Mitnick <strong>studied computer science <\/strong>at the Computer Learning Center in Los Angeles. After only a few months and a hacked computer system, they made him a special offer. He had the choice either to run a project to improve computer security at the Computer Learning Center, or they would kick him out for hacking their system. He took the opportunity and run the project. In the end, he graduated cum laude. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"294\" height=\"292\" data-attachment-id=\"8726\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/mitnicksmall-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnicksmall-1.jpg\" data-orig-size=\"294,292\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1567217996&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"mitnicksmall\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnicksmall-1.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnicksmall-1.jpg\" alt=\"Kevin Mitnick as a Child, Social Engineering, Hacker, Manipulation\" class=\"wp-image-8726\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnicksmall-1.jpg 294w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnicksmall-1-150x150.jpg 150w\" sizes=\"auto, (max-width: 294px) 100vw, 294px\" \/><figcaption class=\"wp-element-caption\">Kevin Mitnick as a child [1]<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Hard Times<\/strong><\/h4>\n\n\n\n<p>Over the following years, Kevin Mitnick <strong>hacked into 40 major corporations<\/strong> [2]. He never damaged the systems or sold stolen information. He loved the intellectual challenge of breaking into systems and networks to find out how the technology works. And being always one step ahead was a big part of his satisfaction. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"432\" height=\"604\" data-attachment-id=\"8729\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/kevin_mitnick_mostwanted-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin_mitnick_mostwanted-1.gif\" data-orig-size=\"432,604\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"kevin_mitnick_mostwanted\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin_mitnick_mostwanted-1.gif\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin_mitnick_mostwanted-1.gif\" alt=\"Kevin Mitnick's Wanted Poster, Social Engineering, Hacker, Manipulation\" class=\"wp-image-8729\"\/><figcaption class=\"wp-element-caption\">Kevin Mitnick&#8217;s Wanted Poster (November 1992) [2]<\/figcaption><\/figure>\n\n\n\n<p>In 1992, Kevin Mitnick was on the FBI Most Wanted List for penetrating some of the best-secured computer systems in the USA. After a few years of fatiguing escape, he was <strong>arrested on February 15, 1995<\/strong> [3]. He spent <strong>five years in prison<\/strong> followed by <strong>three years of supervised release<\/strong> during which time he was not allowed to use any computer system at all [1]. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"8730\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/mitnickcrime\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnickcrime.jpg\" data-orig-size=\"620,1022\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;AP&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;FILE--Kevin Mitnick enters the U.S. Courthouse in Raleigh, N.C. in this Feb. 17, 1995 file photo.  Computer hacker Mitnick, 35, a computer vandal whose exploits made him the FBI&#039;s most wanted hacker, pleaded guilty Friday, March 26, 1999 to computer and wire fraud charges in a deal that could make him a free man in a year.  (AP Photo\/Raleigh News \\u0026amp; Observer-Jim Bounds, File)&quot;,&quot;created_timestamp&quot;:&quot;792885270&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;KEVIN MITNICK&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mitnickcrime\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;FILE&amp;#8211;Kevin Mitnick enters the U.S. Courthouse in Raleigh, N.C. in this Feb. 17, 1995 file photo.  Computer hacker Mitnick, 35, a computer vandal whose exploits made him the FBI&amp;#8217;s most wanted hacker, pleaded guilty Friday, March 26, 1999 to computer and wire fraud charges in a deal that could make him a free man in a year.  (AP Photo\/Raleigh News &amp;amp; Observer-Jim Bounds, File)&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnickcrime.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnickcrime.jpg\" alt=\"Kevin Mitnick, Social Engineering, Hacker, Manipulation\" class=\"wp-image-8730\" width=\"465\" height=\"767\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnickcrime.jpg 620w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/mitnickcrime-182x300.jpg 182w\" sizes=\"auto, (max-width: 465px) 100vw, 465px\" \/><figcaption class=\"wp-element-caption\">Kevin Mitnick goes into the U.S. Courthouse in Raleigh (February 17,1995) [3]<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Kevin Mitnick Today<\/strong><\/h4>\n\n\n\n<p>Kevin Mitnick is <strong>one of the<\/strong> <strong>global bestselling authors<\/strong> and wrote four books [2]. His first bestseller \u201cThe Art of Deception: Controlling the Human Element of Security\u201d was published in 2002. The blog entry focuses on this work. Three years later his second book \u201cThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers\u201d was published. By the condition of the court, he wasn\u2019t allowed to report on his experiences as a hacker for several years. Therefore, his work \u201cGhost in the Wires: My Adventures as the World\u2019s Most Wanted Hacker\u201d was released for the first time in 2011. His last book is from the year 2017 and bears the title \u201cThe Art of Invisibility: The World\u2019s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data\u201d. <\/p>\n\n\n\n<p>Furthermore, he\u2019s the <strong>CEO of <\/strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/mitnicksecurity.com\/\" target=\"_blank\"><strong>Mitnick Security<\/strong><\/a> [2]. Kevin Mitnick and his team analyze security risks and vulnerabilities of their clients using sophisticated technology and in-depth knowledge [4]. <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/mitnicksecurity.com\/about\/mitnick-example-clients\" target=\"_blank\">Some of their clients<\/a> are for example Dell, Hewlett Packard, IBM, NASA, Oracle, Visa and MasterCard [5].<\/p>\n\n\n\n<p>Besides, he\u2019s the <strong>Chief Hacking Officer of <\/strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\"><strong>KnowBe4<\/strong><\/a> which is a security awareness training company [3]. And all around the world Kevin Mitnick gives presentations and talks about the latest hacking techniques [2].<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"660\" data-attachment-id=\"8733\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/kevin-mitnick-today\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg\" data-orig-size=\"940,660\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"kevin-mitnick today\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg\" alt=\"Kevin David Mitnick, Social Engineering, Hacker, Manipulation\" class=\"wp-image-8733\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg 940w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today-300x211.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today-768x539.jpg 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><figcaption class=\"wp-element-caption\">Kevin Mitnick is the world\u2019s most famous hacker, a bestselling author and one of the top cybersecurity speakers [4]<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Social Engineer?<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Social engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.<\/p>\n<cite> Kevin Mitnick [6] <\/cite><\/blockquote>\n\n\n\n<p>In simple words, social engineering is an activity in which <strong>people are made to do things for strangers<\/strong> that they wouldn\u2019t normally do. It works primarily because employees have no idea of basic safety practices. And the social engineer also takes advantage of human credulity as well as the need to help other people. <\/p>\n\n\n\n<p>To be a successful social engineer, he or she usually possesses <strong>very good social skills<\/strong>. It\u2019s someone who is <strong>charming<\/strong>, <strong>polite<\/strong> and has <strong>sympathetic character traits<\/strong>. All these qualities lead people to immediately build a relationship with that person. Which is above all characterized by trust. An experienced social engineer can acquire practically all desired information with the help of the tactics and strategies of his trade. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Cycle of Social Engineering<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"432\" data-attachment-id=\"8738\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/cycle\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle.png\" data-orig-size=\"1802,760\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cycle\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle-1024x432.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle-1024x432.png\" alt=\"Social Engineering Cycle, Attack, Manipulation\" class=\"wp-image-8738\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle-1024x432.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle-300x127.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle-768x324.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/cycle.png 1802w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Diagram of the cycle of social engineering<\/figcaption><\/figure>\n\n\n\n<p>Everything starts with the <strong>research<\/strong>. The social engineer needs facts and information to know the intern jargon better. It\u2019s requisite for developing relationships and trust in the next step. The research includes searching publicly accessible sources such as annual reports, newspaper clippings or content of websites. Sometimes <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.lexico.com\/en\/definition\/dumpster-dive\" target=\"_blank\">dumpster diving<\/a> could be necessary. <\/p>\n\n\n\n<p>In the next phase, the social engineer <strong>develops<\/strong> <strong>relationships and trust<\/strong>. Therefore, he or she uses insider information or misrepresentation of identity. In some cases, the social engineer names references to a person known to the victim as well as taking advantage of the need for help or the bondage to authority.<\/p>\n\n\n\n<p>After that, the attacker starts to exploit the trust. He or she\u2019s <strong>requesting information or an action<\/strong> from the victim. Sometimes the social engineer manipulates the victim in such a way that he or she asks the attacker for help. <\/p>\n\n\n\n<p>If the collected data isn\u2019t the final information in demand. The social engineer returns to step one and <strong>repeats the whole cycle until the target is reached<\/strong>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Art of the Attacker: The 7 Steps to Get Someone to Do What the Attacker Wants<\/h2>\n\n\n\n<p>Some mentioned\ntechniques are strongly interconnected. However, it\u2019s neither necessary nor\nuseful to use all techniques at the same time. But every technique can be\nadvantageous at different times and for different victims. With every attack, a\nsocial engineer refines his or her sense of when which methods should be used. The\nfollowing seven headlines are from Kevin Mitnick&#8217;s book \u201cThe Art of Deception\u201d\nand correspond to chapters two to eight.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#1 When Innocuous Information Isn\u2019t: The Hidden Value of Information<\/strong><\/h4>\n\n\n\n<p>Even if individual pieces of information may be irrelevant in themselves when someone puts <strong>everything together the hidden value becomes visible<\/strong>. For example, when a social engineer collects pieces of information like department abbreviations and for what they\u2019re responsible, he or she gets a clear picture of the internal structure of a company. Knowing the internal jargon and the structure of a company is very helpful. By having internal knowledge a social engineer gains credibility.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#2 The Direct Attack: Just Asking for It<\/strong><\/h4>\n\n\n\n<p>Many attacks by social engineers are complicated and require good planning of the individual steps. They rely on technical sophistication and extensive manipulation. It&#8217;s amazing, however, that sometimes it&#8217;s enough to <strong>just ask for the wanted information<\/strong>. In this case, the knowledge of the internal jargon is of great importance. Employees would never give away sensitive information. But of course, different rules apply to colleagues than to outsiders. Another very common tactic is to hide the key question among a lot of unimportant questions and statements.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#3 Building Trust: The Key to Deception<\/strong><\/h4>\n\n\n\n<p>It happens that an employee doesn&#8217;t know the person who asks him or her for something. They work in different departments of the company or at least the other one claims that. But if the information provided is appropriate and the other person gives the impression that he or she\u2019s the necessary knowledge by using the right internal jargon. The victim will expand the circle of trust and includes the person in it. Then the employee probably gives the social engineer what he or she\u2019s asking for. By having internal knowledge an attacker gains credibility and this <strong>credibility leads to trust<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#4 \u201cLet Me Help You\u201d<\/strong><\/h4>\n\n\n\n<p>Everyone is\nvery grateful when he or she deals with a problem and then someone comes by\nwith knowledge and skill to help and offer support. The social engineer takes\nadvantage of this and knows exactly how he or she can solve the problems for\nothers since the social engineer causes them. After solving the artificially generated\nproblem the victim is very grateful and happy for the support. This can lead to\na situation where the victim gives the attacker some critical information or do\nhim or her a favor. <\/p>\n\n\n\n<p>Another\nbenefit is that an attacker who is called by the victim gains immediate\ncredibility. Because the victim thinks that he or she\u2019s calling someone who\nworks in computer service, the victim would never ask the attacker to prove his\nor her identity. <\/p>\n\n\n\n<p>To set up a situation in which the victim has to deal with a problem and asks the social engineer for help is called <strong>Reverse Social Engineering <\/strong>or <strong>the Reverse Sting<\/strong>. Another form of Reverse Social Engineering is when the victim recognizes the attack and uses psychological principles of manipulation to obtain as much information as possible from the attacker. With the help of this information, the company can try to protect themselves. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#5 \u201cCan You Help Me?\u201d<\/strong><\/h4>\n\n\n\n<p>Another successful method of social engineering is <strong>to pretend that the attacker needs help<\/strong>. If somebody is in a jam, he or she\u2019s the people\u2019s sympathy. And this has proven to be an effective lever to achieve the social engineer&#8217;s goal. For example, an attacker introduces himself as an alleged colleague and the victim believes him or her. The diligence to help a colleague sometimes lubricates the cogs in the industry. But at the same time, this willingness to help could be a vulnerability and the social engineer would always take this chance and tries to exploit it.&nbsp; <\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#6 Phony Sites and Dangerous Attachments<\/strong><\/h4>\n\n\n\n<p>People have\na natural desire to get gifts for free. The smart attacker keeps that fact in\nmind while trying to break into the corporate network. Occasionally an offer\nappears in the mailbox that attracts the victim\u2019s attention. No matter what the\noffer is about, the email will show how to download a file or click a link. And\nif the victim follows the instructions, the attacker wins. <\/p>\n\n\n\n<p>The <strong>most damaging forms of malicious code \u2013 worms \u2013<\/strong> have all relied on social engineering techniques to spread them, <strong>exploiting that everyone wants something for free<\/strong>. Especially when the email comes from a friend or business colleague, people tend to open the attachment without bad ulterior motives. The worm can multiply through innocent victims and appears to come from a trusted person. <\/p>\n\n\n\n<p>Another type of internet fraud is that the attacker has set up a <strong>false login website<\/strong>, which looks very similar to the real website. The difference is that the wrong screen page does not give access to the computer system that the user wants to reach, but instead forwards his or her username and password to the hacker.<\/p>\n\n\n\n<p>Another regularly recurring trick is to send an email with a tempting offer to visit a certain website, and the receiver can go there directly via a link in the email. Only that<strong> this link won\u2019t take the receiver to the expected website<\/strong>, because the link in principle only pretends to connect to that website. The social engineer exploits the fact that people do not pay close attention to the exact link spelling or perceive a minimal deviation as a representation error. For example www.PayPai.com instead of www.PayPal.com. The fake website looks similar to the real website and the victims enter their usernames, passwords or credit card information carelessly. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>#7 Using Sympathy, Guilt, and Intimidation<\/strong><\/h4>\n\n\n\n<p>Skillful social engineers are very experienced in inventing impostures in which<strong> emotions such as fear, excitement or guilt are used to manipulate the victims<\/strong>. They use psychological triggers \u2013 automatic mechanisms that make others react immediately to concerns without a thorough analysis of all available information.<\/p>\n\n\n\n<p>Everyone\nremembers the first day, especially when somebody is young and inexperienced.\nSo when a newly hired person asks for help, he or she can assume that many\npeople remember the feelings and help more than usual. A social engineer takes\nadvantage of this and can use it to get the victim\u2019s sympathies. <\/p>\n\n\n\n<p>Furthermore,\neveryone wants to avoid difficult situations for themselves and others.\nBuilding on this positive impulse, the attacker can take advantage of a\nperson&#8217;s sympathy, make the victim feel guilty, or use intimidation as a\nweapon.<\/p>\n\n\n\n<p>A popular and highly effective form of intimidation relies on<strong> influencing human behavior through the use of authority<\/strong>. The name of the executive secretary alone can be of value. To mention the name of a person with a high(er) position is called<strong> <\/strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.lexico.com\/en\/definition\/name-drop\" target=\"_blank\"><strong>name-dropping<\/strong><\/a>. It\u2019s usually used to quickly establish a relationship with a victim because it assumes that the attacker is very close to an authority figure. The scam of intimidating someone by reference to authority works particularly well when the other person is in a fairly low position in the hierarchy of the company. Besides a victim is much more likely to do the social engineer a favor if he or she\u2019s supposed to know a friend of the victim. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are There Any Warning Signs for an Attack?<\/h2>\n\n\n\n<p>A warning sign could be if a <strong>caller refuses to provide a callback number<\/strong> or have <strong>unusual requests<\/strong>. Furthermore, if somebody tries to <strong>play out authority<\/strong> or has a <strong>request with particularly high urgency<\/strong>, special care should be taken. In such cases, intimidation shouldn\u2019t be the reason for giving in. Maybe the attacker tries to increase the pressure with the <strong>threat of negative consequences<\/strong> in the event of non-cooperation. Often he or she reacts <strong>annoyed to inquiries<\/strong>. Also, the opposite could be used to manipulate the victim for example with <strong>compliments<\/strong>, <strong>flatteries<\/strong> or <strong>flirts<\/strong>. And last but not least, occasionally <strong>dropping known names<\/strong>.&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Can You Do to Protect Yourself and Your Company?<\/h2>\n\n\n\n<p>Kevin\nMitnick has dedicated an entire chapter to the subject \u201cRecommended Corporate\nInformation Security Policies\u201d in his book \u201cThe Art of Deception\u201d. Here you can\nfind some of his tips to reduce the chances of a social engineer. But the most\nimportant thing first, every company should adapt the policies to its demands\nand circumstances. There is no such thing as off-the-shelf safety.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Never give anyone personal information or internal company information if the <strong>caller is unknown<\/strong> and the <strong>need for the request isn\u2019t understandable<\/strong>.<\/li>\n\n\n\n<li>Each employee needs to be aware that when a caller <strong>knows internal company information<\/strong> like procedures or identifiers that <strong>isn\u2019t enough to authenticate<\/strong> <strong>the requester <\/strong>or authorize him or her to get information.&nbsp;<\/li>\n\n\n\n<li>A fast way to verify the identity of a person on the phone is to<strong> call that person under the telephone number in the company&#8217;s phone directory<\/strong>. In the case that the call can\u2019t be answered personally, there is the possibility to hear the voice of the colleague via voicemail and compare it to that of the attacker.<\/li>\n\n\n\n<li>The employees of a company usually have different roles and responsibilities, and each position has its weaknesses. There should be a <strong>basic training to be done by everyone<\/strong>. Furthermore, employees must also be <strong>trained according to their tasks<\/strong>. Persons who work with confidential information or occupy positions of trust should receive additional <strong>special training<\/strong>. <\/li>\n\n\n\n<li><strong>Employees need to<\/strong> <strong>know about the strategies and methods of social engineering<\/strong> to carefully analyze the requests they receive. Role-playing can be a useful tool so that employees gain a better understanding of how a social engineer acts.<\/li>\n\n\n\n<li><strong>Security personnel and system administrators<\/strong> also need to ensure for themselves that they <strong>follow the security rules<\/strong>, procedures, and practices. Sometimes they forget about it while they focus on everyone else sticking to it.<\/li>\n\n\n\n<li>A huge amount of scam emails have <strong>not well-formulated texts<\/strong> and when a <strong>company asks for private information about another company<\/strong>, everyone should become suspicious. <\/li>\n\n\n\n<li>Everyone should <strong>know the symbol looks like a tiny padlock<\/strong>. That symbol appears somewhere on the website. If it\u2019s been certified as safe the hanger is closed, otherwise, the communication isn\u2019t encrypted and the website should be closed immediately. <\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Your system\nis only as secure as the weakest link in your security chain. No matter how\ngood your safety precautions are. You should never underestimate the human risk\nfactor. Unfortunately, it isn\u2019t possible to be fully covered. However, with a\nsufficient understanding of social engineering and security policies\nappropriate to your company, the probability of a successful attack can be\nreduced.<\/p>\n\n\n\n<p>If you\u2019re\ncurious to hear more about the topic, then the book \u201cThe Art of Deception\u201d is\nrecommendable. Kevin Mitnick offers you many sample stories and conversations\nto deepen your understanding of the different techniques. He also offers a wide\nrange of recommended security guidelines. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>The blog entry content is based on the German version\n[7] of Kevin Mitnick\u2019s book \u201cThe Art of Deception\u201d. If not, the source is\nexplicitly marked. All online references and images were last checked on August\n31, 2019.<\/p>\n\n\n\n<p>[1] <a href=\"https:\/\/www.phishprotection.com\/heroes\/kevin-mitnick\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.phishprotection.com\/heroes\/kevin-mitnick\/<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/mitnicksecurity.com\/about\/kevin-mitnick-worlds-most-famous-hacker-biography\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/mitnicksecurity.com\/about\/kevin-mitnick-worlds-most-famous-hacker-biography<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick<\/a><\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/www.mitnicksecurity.com\/about\/the-global-ghost-team\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.mitnicksecurity.com\/about\/the-global-ghost-team<\/a><\/p>\n\n\n\n<p>[5] <a href=\"https:\/\/mitnicksecurity.com\/about\/mitnick-example-clients\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/mitnicksecurity.com\/about\/mitnick-example-clients<\/a> <\/p>\n\n\n\n<p>[6] Kevin D. Mitnick, William L. Simon, Steve Wozniak: <em>The Art of Deception: Controlling the Human\nElement of Security.<\/em> (Wiley 2002) p. 4<\/p>\n\n\n\n<p>[7] Kevin D. Mitnick, William L.\nSimon: <em>Die Kunst der T\u00e4uschung:\nRisikofaktor Mensch<\/em>. (mitp 2011)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Image Sources<\/h2>\n\n\n\n<p>Post Image (at the top of the page) <a href=\"https:\/\/pbs.twimg.com\/profile_images\/746860382225076224\/qMcxl_W7_400x400.jpg\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/pbs.twimg.com\/profile_images\/746860382225076224\/qMcxl_W7_400x400.jpg<\/a><\/p>\n\n\n\n<p>[1] <a href=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2014\/10\/02\/4c1f7019-4a02-11e4-b6a0-d4ae52e95e57\/86c57d8ef71178ca6a3642ed5ccd5404\/mitnicksmall.jpg\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2014\/10\/02\/4c1f7019-4a02-11e4-b6a0-d4ae52e95e57\/86c57d8ef71178ca6a3642ed5ccd5404\/mitnicksmall.jpg<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/urgente.files.wordpress.com\/2008\/12\/kevin_mitnick.gif\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/urgente.files.wordpress.com\/2008\/12\/kevin_mitnick.gif<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/www.denverpost.com\/wp-content\/uploads\/2018\/03\/210139.jpg?w=910\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.denverpost.com\/wp-content\/uploads\/2018\/03\/210139.jpg?w=910<\/a><\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/www.arabianbusiness.com\/sites\/default\/files\/styles\/full_img\/public\/images\/2019\/03\/13\/kevin-mitnick.jpg\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.arabianbusiness.com\/sites\/default\/files\/styles\/full_img\/public\/images\/2019\/03\/13\/kevin-mitnick.jpg<\/a> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Further Readings<\/h2>\n\n\n\n<p>Kevin D. Mitnick, William L. Simon: <em>The Art of Intrusion: The Real Stories Behind the Exploits of Hackers,\nIntruders and Deceivers<\/em>. (Indianapolis: Wiley Publishing Inc. 2005)<\/p>\n\n\n\n<p>Kevin D. Mitnick, William L. Simon, Steve Wozniak: <em>Ghost in the Wires: My Adventures as the\nWorld&#8217;s Most Wanted Hacker.<\/em> (Little, Brown 2011)<\/p>\n\n\n\n<p>Kevin D. Mitnick, Robert Vamosi, Mikko Hypponen: <em>The Art of Invisibility: The World\u2019s Most\nFamous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data.<\/em>\n(Little, Brown 2017)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It isn\u2019t always necessary to attack by technical means to collect information or to penetrate a system. In many cases, it\u2019s more effective to exploit the human risk factor. To successfully protect yourself and your company from social engineering, you\u2019ve to understand how a social engineer works. And the best way to do this is [&hellip;]<\/p>\n","protected":false},"author":946,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26],"tags":[301,304,302,305,303,198],"ppma_author":[802],"class_list":["post-8720","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-secure-systems","tag-attacker","tag-hacker","tag-kevin-david-mitnick","tag-kevin-mitnick","tag-manipulation","tag-social-engineering"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":3867,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/social-engineering-hacking-the-human-os\/","url_meta":{"origin":8720,"position":0},"title":"Social Engineering &#8211; Hacking the human OS","author":"Benjamin Kowatsch","date":"7. August 2018","format":false,"excerpt":"Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":20593,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/09\/25\/herzlichen-gluckwunsch-sie-haben-gewonnen\/","url_meta":{"origin":8720,"position":1},"title":"HERZLICHEN GL\u00dcCKWUNSCH &#8211; Sie haben gewonnen!","author":"Eric Prytulla","date":"25. September 2021","format":false,"excerpt":"\u00dcber Social Engineering und wie man sich sch\u00fctzen kann. Jeder kennt E-Mails mit Titeln wie diesem. Eine wildfremde Person verspricht Gewinne in Millionenh\u00f6he. Und alles, was daf\u00fcr ben\u00f6tigt wird, sind ein paar pers\u00f6nliche Daten. Ein Traum vieler Menschen wird wahr und man will dem Titel glauben. Doch was passiert, wenn\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/Spam.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":26850,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/21\/schutz-vor-staatlichen-cyberangriffen\/","url_meta":{"origin":8720,"position":2},"title":"Schutz vor staatlichen Cyberangriffen","author":"Marcel Willie","date":"21. February 2025","format":false,"excerpt":"Cyberangriffe sind heute ein zentrales Instrument staatlicher Akteure. Stuxnet, SolarWinds, Vault7 oder XZ-Utils sind nur ein paar der popul\u00e4ren F\u00e4lle, bei denen kritische Infrastrukturen, Unternehmen und Regierungsbeh\u00f6rden im Visier standen. Doch wie kann man sich vor dieser Bedrohung sch\u00fctzen? Warum klassische Schutzma\u00dfnahmen nicht ausreichen Firewalls, Antivirus-Software und regelm\u00e4\u00dfige Updates sind\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":20004,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/03\/wie-man-menschen-dazu-bringt-dinge-zu-tun-die-sie-nicht-tun-sollten\/","url_meta":{"origin":8720,"position":3},"title":"Wie man Menschen dazu bringt Dinge zu tun, die sie nicht tun sollten","author":"Florian Jungermann","date":"3. August 2021","format":false,"excerpt":"Disclaimer Der folgende Artikel bedient sich einer zynischen, teils sarkastischen Sprache und ist als \"Anleitung f\u00fcr Manipulatoren\" verfasst. Diese Perspektive ist selbstverst\u00e4ndlich als stilistisches Mittel zu verstehen - das Ziel des Artikels ist Aufkl\u00e4rung und Sensilibisierung. Einleitung Nicht nur Maschinen lassen sich hacken; auch Menschen sind dazu hervorragend geeignet -\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2442,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/28\/social-engineering-firewall-rules-for-your-brain-part-1\/","url_meta":{"origin":8720,"position":4},"title":"Social Engineering: Firewall-Rules for your brain \u2013 Part 1","author":"Simon Schuster","date":"28. July 2017","format":false,"excerpt":"Humans can be regarded as one of the biggest weaknesses for secure systems. Their interaction with technology and awareness for information security makes them usually the \u201cweak link\u201d for gaining access to enterprise networks and private information. From an attackers point of view the investment of using a human to\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1770,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/06\/08\/our-moments-of-aha\/","url_meta":{"origin":8720,"position":5},"title":"Our moments of AHA","author":"Walter Kriha","date":"8. June 2017","format":false,"excerpt":"Once again we spent an entire semester rifling through papers trying to learn something from the great ideas and mistakes others did before us. In this post we want to share with you our greatest moments of aha together with the papers that provoked them. How hacking team got hacked\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Lightbulb with lensflair","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":802,"user_id":946,"is_guest":0,"slug":"gk046","display_name":"Gisela Kollotzek","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/53ce0122eb54d0f564126ee48245355075afd374860bbb9dae51f5062b47e4c7?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/946"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=8720"}],"version-history":[{"count":51,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8720\/revisions"}],"predecessor-version":[{"id":25430,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/8720\/revisions\/25430"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=8720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=8720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=8720"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=8720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}