SlideShare a Scribd company logo
1 of 53
Thirty-Six
Stratagems of
Social Engineering, Part I
三十六社交工程計,上
On Stratagems
• Stratagems have been around since the age of city states.
• They were primary used during wars in ancient times.
• They expanded into politic throughout imperial era.
• They broaden into commerce amid mercantile period.
• And now in the millennium of information age, they are
rebranding themselves as social engineering with design
to fool hearts & minds of populace.
謀
略
戦
略
전
략
On Thirty-Six Stratagems
• Stratagems have been used and recorded before the time of
Spring and Autumn (771-476 BC)
• Tan Daoji, a Liu Song Dynasty general (D 436 AD), had
organized, codified and written them down as
Thirty-Six Stratagems.
 The title itself is a reference to I Ching where six is associated with Yin
which represented hidden and intrigues. And thirty-six is square of six,
this signifies numerous and interchanging schemes.
• Its counterpart was a book called Strategemata which was
written by Sextus Julius Frontinus, 1st century Roman
senator, who was famous for his deal with aqueducts.
 Unfortunately, that book was lost
三
十
六
計
Why Thirty-Six
Social Engineer Stratagems?
• As organization/nation-states are strengthened software and
network aspect of cyber defenses, attackers have to look for other
ways to access data.
• Cyber attacks like all forms of warfare are ever escalating. In 2003,
phishing introduced the art of social engineering into information
security world. An email, that informed users of their password
expiration, has opened up a new battlefront.
• For a more sophisticate and escalate data breach, a master plan will
be required, numerous stratagems are hatched to deal with various
scenario, and vast numbers of bots will provide ample firepower.
• An objective for this slide is to provide food for thoughts to InfoSec
Pro (Information Security Professions) to recognize patterns and
hopefully come up with means to deal with them.
社
交
工
程
Requirements for
Successful Stratagems (1/3)
1. Understand opponent’s nature
 Social Media
 News outlets
 EmployeesFriendsHaters
2. Understand opponent’s tactic/skills
 News outlets
 Conventions
 Webinars
3. Understand the situation at hand
(Comparison of advantages/
disadvantages)
 Know your opponent like yourself in
order to neutralize their advantages and
shore up your disadvantages
Requirements for
Successful Stratagems (2/3)
4. Reconnaissance
 Know your entry and exit points
5. Be highly alert in an unusual
situation
 Are you been played (See below)
6. Expose weakness to entice opponent
 Useful if your opponent is aggressive or
hubris
 Lower opponent’s guard
 Let opponent know your goals or
methods
Requirements for
Successful Stratagems (3/3)
7. Hidden motives and goals
 Why make it easy for opponents
 Maintain initiative
 Allow room for maneuver
8. At a crucial time, strike at their
blind side in order to maintain
advantages
 Their greatest triumph could also be
their greatest weakness.
 This can apply to you just as well
How This Slide Is Presented
• Thirty Six Stratagems are divided into 6 Chapters
• Each chapter contains six stratagems.
• This slide lists thirty-six stratagems but will focus only
two stratagems per chapter.
Winning Stratagems
勝戰之計
How to use your enemy to your advantages
Winning Stratagems
勝戰之計
• Yang element of stratagems
 you know exactly of yours and your opponents strengths
and/or
 you have an advantage
• Military talks about utilize force multiplier; here
stratagems are talked about force divider.
 Force divider are used on your opponent forces
 It is about using least amount of resources to achieve
greatest amount of wins.
List of Winning Stratagems
1. Deceiving heavens,
crossing oceans
瞞天過海
2. Besiege Wei, rescue Zhao
圍魏救趙
3. Murder with a borrowed
knife
借刀殺人
4. Leisurely wait on laboring
enemy
以逸代勞
5. Loot a burning house
趁火打劫
6. Sounding East,
Striking West
聲東擊西
Besiege Wei, rescue Zhao
圍魏救趙
Explanation
It is better to face a divided opponent
than a concentrated opponent; it’s
better to fight through subtlety than
head-to-head.
The objective is to force opponent to
lose control of situation and
initiative.
Historical Context
Sun Bin, a military strategist of Qi State
during Chinese Warring States Period,
was ordered to rescue an ally, Zhao State,
from hegemon, Wei State.
Rather than face the enemy with
superiority force and advantages, he
attacked Wei’s capital. There, he had no
problem defeat the defending army and
laid a siege. King of Wei recalled his
general who was on the verge of
conquering Zhao to return immediately.
By the time that general returned to Wei’s
capital, Sun Bin had already returned
home, and Zhao State was saved.
Besiege Wei, rescue Zhao
圍魏救趙
Modern time
The objective is to knock InfoSec Pro off
what he was doing and have him focus
on something else. This forces him to
redirect his efforts and incurs lost of
times and energies.
Modern Scenario
Work best against command and control
or highly politicized structure where
CISO or ISO manager micro managed
his staff to an extended that they can’t
act without him say so.
The game plan is to create an alternate
attacks that targeted CEO or C level
management. This would work only if
there is an inside man or you’re certain
that C level machines are compromised.
Leisurely Wait on Laboring Enemies
以逸代勞
Explanation
Force your opponents into adverse
situations that sapped their strength and
exhausted their spirits. Then attack them
with your fresh force.
It is never a good idea to confront foes
whose energy and morale are high. It is
better to exhaust them while maintain
high energy and morale on yourself.
Historical Context
During Warring States Period, Qin State
lunched an invasion against Chu State
that was led by a young general. After a
series of wins, he became overconfident
and fell into ambush that destroyed his
force and have him retreated all the way
back to Qin.
In response, Qin State send an elder
general who stopped at the border of Qin
and Chu and build up his defense. While
Chu troops wanted a quick decisive battle,
Qin troops hid behind fortress. When Chu
force exhausted their supplies and
withdrawal, Qin troops attacked from
behind and annihilated them. Chu State
was eliminated soon after .
Leisurely Wait on Strained Enemies
以逸代勞
Modern Time
This stratagem supports the idea of
taking control of the situation from
InfoSec Pro. This is done by exhausting
him to the point of making a wrong call,
oversight, overreact, overreach, etc…
While direct confrontation (against an
active opponent) is exciting and
generate much buzz, it also drained and
tied up both resources (even if those
resources are hijacked) and time.
Modern Scenario
A series of false positives at various
sources and locations can require
InfoSec Pro’s immediate attention.
Or even like the historical context, pose
an imminent threat that he can see it
coming and have him waiting. However,
in this case, with modern technology,
InfoSec Pro can afford and do welcome
the wait as this allows him to shore up
his defenses as well.
Enemy Dealing
Stratagems
敵戰之計
How to encounter enemies
Enemy Dealing Stratagems
敵戰之計
• Yin element of stratagems
 you do not know your opponents strengths
and/or
 you are in a disadvantage
• Initial contact with opposing force
 Probing attacks/recons
 Verify how opponents response before and after an attack
List of Enemy Dealing Stratagems
1. Create something from
nothing
無中生有
2. Openly repairing the road,
sneaking through the back
明修棧道,暗渡陳倉
3. Watch fires burn, across the
river
隔岸觀火
4. Hiding a knife behind a
smile
笑裡藏刀
5. Sacrifice a plum, preserve a
peach
李代桃僵
6. Take an opportunity to pilfer a
goat
順手牽羊
Watch fires burn, across the river
隔岸觀火
Explanation
When there is a conflict within enemy
camp and chaos ensures, it is best to sit
back and watch. Wait till their internal
conflicts deepened which would
deepened hatred among them. It would
turn into violence and its aftermath,
the enemy would be much weaken.
Then it is the time to act.
Historical Context
During Three Kingdoms period, Cao
Cao had defeated Yuan Shao who soon
passed away without naming an heir.
Through political maneuver, the
youngest son became the lord which
undoubtedly caused resentments with
the other two.
When Cao Cao attacked again, his force
was repelled because of united Yuan
front. Under advice from his staff, Cao
Cao waited. Soon, sons bickered among
themselves and split into factions. Next
time Cao Cao attacked, his opponents
were much weaker and he was able
eliminated Yuan faction altogether.
Watch fires burn, from the river
隔岸觀火
Modern Time
In most companies, there exists an
unease tension between InfoSec Pro
with Network, InfoSec Pro with IT, or
InfoSec Pro with rest of employees. And
in most instances, InfoSec Pro has to
play the bad guy by saying No to things
that used to take for granted.
Attackers can exploit such tension and
cause it to erupt into actual office
politics causalities. No matter who win
or lose, office morale will always
decrease and this present an ideal time
to strike.
Modern Scenario
After a successful attack against an
highly politicized work environment,
send a city-wide email thanking the
InfoSec Pro for making it happen.
Even if it is not lit up immediately as
the spark for employee review, the seed
of doubt is incepted.
Take an opportunity to pilfer a goat
順手牽羊
Explanation
When one saw a stray sheep in the
opening, he’s tempted to shepherd it
home. So is taking an opportunity when
it presents itself no matter how small it
is, it will just lead to something bigger.
Alternatively, take advantage of
someone’s opportunistic nature to cause
great harm.
Historical Context
During Spring & Autumn Period, a Qi
minister helped a prince to become Lord
of Qi State. But the new Qi Lord was
lecherous and soon had numerous
affairs with the minister’s wife.
Eventually, the minister found out.
Under pretext of being ills, he’s unable
to attain his duty. When the lord knew,
he went to minister’s home under the
pretense of inquiring minister’s health.
Instead he went to wife’s chamber. After
she excused herself, the lord was
trapped and soon killed.
Take a sheep on the way out
順手牽羊
Modern Time
This is one of most commonly used
social engineering techniques in the
modern time. Under guise of free,
people will download anything and
everything to take advantage of it.
Another variation is to give away free
USB, micro-SD cards, or Thunderbolt
drive to prospective clients.
Attacking Stratagems
攻戰之計
How to attack
Attacking Stratagems
攻戰之計
• Yang element of stratagems
 you know exactly of yours and your opponents strengths
and/or
 you have an advantage
• Frontal attacks when they know you are coming
 How to get around their defenses
 How to direct your maximum force against their weakest
point.
Summary of Attacking
1. Stomping grass, scaring
snake
打草驚蛇
2. Borrow a corpse to
resurrect a soul
借屍還魂
3. Entice the tiger to leave its
mountain
調虎離山
4. Capture through Release
欲擒故縱
5. Trading a brick for a jade
拋磚引玉
6. Defeat enemy through
their chief
擒賊擒王
Borrow a corpse to resurrect a soul
借屍還魂
Explanation
Something useful shouldn’t be loaned;
something not useful should be
borrowed; use only borrowed useless
thing. It is not me who sought out the
child, but the child sought me out.
Even if you have overwhelm force,
never display it or utilize it unless
absolute necessary. By remain hidden,
it created doubt and uncertainty in your
enemies who wondered where would
you strike. Rather, use something
insignificant and something borrow, it
draw off attention and allow you to
increase your sphere of influence.
Historical Context
During Three Kingdoms period, Liu Bei sought out
sanctuary with a follow kinsman and a lord. While
the lord agreed, his two loyal ministers were
worried, Liu Bei was infamous for bringing
downfall to those who helped him. They decided to
assassinate Liu Bei. But their plan was leaked.
When they arrived to Liu Bei’s camp, they were
welcome and a festival was made in honor of
upcoming alliance. During middle of celebration,
Liu Bei confided to two assassins that he had
secret military plan to share with them. When they
came to his tent, Liu Bei’s troops seized them,
searched and found hidden daggers.
Assassins were beheaded and Liu Bei announced to
accompany troops that he feared for their lord’s
safety and asked them to return. Troops were
followed by Liu Bei’s force. At the city gate, guards
recognized returned troops and opened the gate.
Liu Bei’s force rushed in. The coupe was completed.
Borrow a corpse to resurrect a soul
借屍還魂
Modern Time
Technology wise, this can associate to
Trojans and Zombies malware.
Social Engineer, this is often refer to
identity theft.
Modern Scenario
Capture through Release
欲擒故縱
Explanation
Fighting when corner; fleeting when
weaken; give chase but do not strain;
exhausted their energy, drained their
spirits; then captured them through
disbursement. Troops do not need to
blood their blades.
Troops will fight to death when they
have nothing to lose. Between flee for
life or fight to death, they will chose to
live. Low morale is infectious and
longer it germinated, the more
damaging it can cause. Low morale,
tired, and exhausted, they would give
up rather than keep on fighting.
Historical Context
In the novel, Romance of the Three
Kingdoms, before Zhuge Liang could
carry war against Wei State, he must
pacify his southern front where local
lord, Meng Huo, had rebelled after the
death of Liu Bei.
Zhuge Liang had captured Meng Huo
seven time, but each time, he chose to
let the rebel leader go because he
wanted to break the rebel spirit.
Despite been released, his new found
insights weren’t accepted by his allies
who thought of him as a loser. By the
seventh capture, Meng Huo knew
Zhuge Liang was indeed a master
strategist and submitted.
Capture through Release
欲擒故縱
Modern Time
A modern equivalent is the Man in the
Middle Attack. This allows attackers to
continue gathering more information by
release captured data/transaction.
In social engineering, Capture through
Release is like tagging a target. That
target becomes the carrier. Through
him, the company internal system can
be compromised; the company incident
response can be revealed; the company
key individuals can be identified.
Modern Scenario
Chaos Stratagems
混戰之計
How to create confusion
Chaos Stratagems
混戰之計
• Yin element of stratagems
 you do not know your opponents strengths
and/or
 you are in a disadvantage
• When an attack becomes a stalemate or attrition
 How to deal with defensive-in-layers concept
 How to fight them individually without being gang-on.
Summary of Chaos
1. Remove firewood from
boiling pot
釜底抽薪
2. Catch a fish through
muddle water
混水摸魚
3. Shedding cicada’s golden
shell
金蟬脫殼
4. Shut the door to catch a
thief
關門捉賊
5. Befriend a distant state
while attacking a
neighboring state
遠交近攻
6. Obtain safe passage to
conquer the State of Guo
假道伐虢
Remove firewood from boiling pot
釜底抽薪
Explanation
If one can’t defeat opposing force,
then one has to remove the opposing
force multiplier.
Tis the image of a swamp below and
force on top.
If enemy force is much stronger than
yours, then you’ll need to destroy the
source of his force multiplier in order to
even the odd.
The last statement referenced to I-
Ching indicates that swamp is at the
bottom because of cyclical and
regulated order. It’s logical step is to
move up.
Historical Context
During Northern Song Dynasty, guards
at Han Province rebelled by raiding and
pillaging. They attempted to kill both
provincial governor and military police
commissioner who were frighten and
hid.
A local magistrate walked out and faced
rebelling troops. He declared, “You all
have wife, parents and children. Why
are you taking such risk? Step aside if
you want no part of it!”
Only eight people remained in the
center who fled to countryside. But soon
they were captured and executed.
Remove firewood from boiling pot
釜底抽薪
Modern Time
Technology: Through recon, a potential
target company has array of defense in
layers that would make a frontal attack
long, brutal, and obvious. What are
their force multipliers? How do you
reduce those layers? Do they have zero
day exploits?
Social Engineering: The company’s
InfoSec are well versed in blue team
defense such as incident detection,
security analysts and forensic analysts.
But let’s focus on their staff? Do they
have any needs that are unmet by their
company?
Befriend a Distant State,
Attack a Nearby State
Explanation
Location determines degree of threats,
profits from close reach;
loss from distance reach.
Fire at top, swamp at bottom.
“Location, location, location” is not just
a real estate slogan but also a strategic
factor. Maximum gain comes from short
campaign. Maximum loss comes from
long campaign. Therefore to conserve
forces, it is better to attack nearby than
to commit troops afar. Not to mention
the fact that it is better to attack a
country than a group of countries.
Historical Context
During the Warring States Period, Qin
State adopted this stratagem as it
began to eliminate other countries. It
made offers to distant states to isolate
nearby states prior invasion. Even if
someone from other 6 states saw
through this stratagem, the distrust
among them had prevented any
attempt to unite against Qin State. In
221 BC, Qin State has united China
after 254 years of warfare and became
known as Qin Dynasty.
遠
交
近
攻
Befriend a Distant State,
Attack a Nearby State
Modern Time
Technology: While it is true that
internet has make irrelevant of
distance as a factor, but it is relevant
during aftermath of an attack. It is far
harder to extradite a hacker to another
state especially if he is perceived to be a
local favorite son.
Socially: Distance as a factor is
interpreted as where InfoSec is in a
company’s organizational hierarchy.
While he may have influence and able
to enforce security on those around him,
but people further above and below
might not be affected as much.
遠
交
近
攻
Proximate
Stratagems
並戰計
How to reduce opponent’s advantages
Proximate Stratagems
並戰計
• Yang element of stratagems
 you know exactly of yours and your opponents strengths
and/or
 you have an advantage
• Even if you have an overwhelm force, how to further
minimalize your loss.
 Play defensively to conserve your strength
 Play defensively to demoralize your opponent forces
Summary of Proximate
1. Replace beams with rotten
timbers
偷梁換柱
2. Pointing mulberry tree
while cursing locust tree
指桑罵槐
3. Feign madness in order to
maintain sanity
假癡不癲
4. Remove ladder after an
enemy ascended the roof
上屋抽梯
5. Deck the tree with false
blossoms
樹上開花
6. Switch from guest to host
反客為主
Replace Beams with Rotten Timbers
偷梁換柱
Explanation
Increased frequent change of opponent’s
forces in order to embedded and weakened
his strongest force; waited till it collapsed on
its on violation, after which, one is able to
control it like directing the wheels of a
moving cart.
In the age of outsourcing human and
technical resources, there is a chance of
inserting bugged talent and/or product. As
these assets moved around the company, this
creates more opportunities to weaken
command and control structure until such
that outsider can gain administrator access.
Historical Context
Qin Shin Huang, the first emperor of historical
China, had two sons. Though he favored the
elder, he did not name him his heir apparent
because he thought he would live a long live.
When his sudden terminal illness came, Qin
Shin Huang issued the imperial decree to name
his elder son as the heir. He died soon after.
His death remained a secret by pro-second son
Prime Minster. The Head Eunuch, also a pro-
second son faction, had the imperial decree and
he conspired with Prime Minster.
Together, they redrafted the imperial decree to
declare the second son as the new emperor and
forced the first son to commit suicide. Thus the
fate of Qin Dynasty was sealed.
Replace Beams with Rotten Timbers
偷梁換柱
Modern Time
Technology: Man in the Middle (MitM) is
a popular hack that allowed attackers to
embed into target’s communication
system in order to gain control and cause
misdirection. Keylogger is another
variation of MitM.
Socially: Purchasing reputable third-party
security software can eliminate and
reduce the influence of MitM. But unlike
software, consultants from reputable third
party firm do not necessary guarantee the
same result. While over 99% of them are
ethical and professional, it is the
remaining few that can be disruptive.
Also as historical context had shown, a
company’s office politic can also have an
impact on its information security.
Deck the Tree with False Blossoms
樹上開花
Explanation
Using surrounding to enhance your
threats; even if your force is small,
your threat will magnify. As wild
geese flew in pattern, theirs
feathers and formation swell.
A popular acronym in computer
world is FUD (fear, uncertainty, and
doubt) which is used whenever one
described the emotion of dealing
with unknown. Used your
opponents emotion against them by
immerse them into unfamiliar
territory.
Historical Context
During The Three Kingdoms Period, Cao
Cao attacked Jing Province upon hearing the
news of its lord passing. Liu Bei had sought
refuge at Jing Province and immediately
retreated further south when he got wind of
the attack. But people followed him and
burdened his force.
When Cao Cao’s army almost caught up to
them, Zhang Fei with thirty some troops
acted as Liu’s rear guards.
Zhang Fei had his troops hidden in the wood
and caused great commotion while he stood
by the narrow bridge. Cao Cao troops paused
at the other side of the bridge when they
saw Zhang Fei by himself, but noises came
from the woods. Fearing an ambush, they
waited until such time that Lie Bei was able
to withdraw his force in safety.
Deck the Tree with False Blossoms
樹上開花
Modern Time
Technology: FUD is quite common
theme in information world. Even the
thought of switching or supporting a
different OS would generate such FUD
among general users. It will not take
much to generate hysteria from
common users.
Socially: Stress from work, office
politics, and economy are building
blocks to FUD hysteria. Social media
such as twitter, 4chan, and facebooks
can spread FUD like a virus in a
congested community.
A modern equivalent is the False Flag.
Desperate
Stratagems
敗戰之計
Always have an exit strategy
Desperate Stratagems
敗戰之計
• Yin element of stratagems
 you do not know your opponents strengths
and/or
 you are in a disadvantage
• How to win even when you are outnumbers
 This is risky because if you lose, you’ll lose big.
 Stratagems are about how to get out of confrontation and
how to live and to fight in another day.
Summary of Desperation
1. The Beauty Trap
美人計
2. The Empty Fort Strategy
空城計
3. Turned Agent Strategy
反間計
4. Self inflected Wound
苦肉計
5. Chain Strategms
連環計
6. Retreat
走為上策
Turned Agent Strategy
反間計
Explanation
Create doubt within doubts, using enemy
spies against them is much more
profitable than embedded our own against
them.
This is the battle of social engineer in
highest form. Can you feed false
information to your opponent through
their agents? For a successful attacks, a
recon of target area is a necessity. The
game here is how to recognize a recon and
then feed them with false data that led
them to honeypot or dead zone.
Historical Context
In the novel, Romance of The Three Kingdoms,
at the Battle of Red Cliff, Cao Cao had
overwhelm force against both Liu Bei and Sun
Quan. Despite Cao troops were unfamiliar with
navy warfare, Cao had subjugated two new
admirals to help train for naval warfare. At the
same time, he send an agent over to persuade
Zhou Yu to defect.
Zhou Yu recognized his old friend and realized
that he was an agent of Cao. While pretended
to listen to his old friend, he leaked false
information about those two new admirals were
agents of Sun. His friend quickly departed and
informed Cao Cao of such news. In fit of rage,
those two admirals were summarily beheaded.
And only then did Cao Cao realize that he had
been played.
Turned Agent Strategy
反間計
Modern Time
Technology: Technology isn’t here yet,
but it may be a matter of time for
someone to develop a bot that will fool
another bot by dissimilate false data .
Socially: Few companies have provided
varied information to different key
members. And by reviewed type of data
leaked, they will know who is the mole.
Self inflected Wound
苦肉計
Explanation
A person does not hurt himself, and if
he is wounded, then this is less likely
to be caused by self injury. Whether
it’s fake or real, or real or fake, it is
now possible to carry out a plan. Even
a man-child can get lucky when
follow this plan through.
This strategy goes opposite with the
saying, “enemy of my enemy is my
friend”. Whether through religion or
culture, we, in general, do not believe
in self-inflict wound and tend to
believe that it’s someone else doing.
As such, we lower our guard toward
the victim.
Historical Context
During the Spring and Autumn Period,
Lord of Zheng State wanted to annex
Hu State. He first married off his
daughter to Lord of Hu State. He
executed the leader of anti-Hu State
faction in his court. These acts have
lessen the guard Hu State had against
Zheng State.
This allowed Zheng State to led a
surprise attack against Hu State and
annexed that dominion once and for all.
Self inflected Wound
苦肉計
Modern Time
Technology: Fake apps that claimed to
help prevent any ransomware or Zeus
malware. While it did remove other
hackers malware, it also introduced its
own variant of ransomware or Zeus
malware.
Modern Time
Socially: A variant of Edward Snowden playbook
could be a Chinese hacker fled from Chinese
government’s prosecution by confirmed what the
West had accused China of doing. By doing so, he
sought for US government protection.
The hacker’s family have been prosecuted and
imprisoned. There was a successful attempt on the
hacker’s life. It also has caused a diplomatic low
point between China and US. While China is
adamant for returned of this Chinese hacker, CIA
had confirmed that this individual had brought
over secrets that they wanted but unable to take.
And he is moved to CIA safehouse.
A couple days later, this Chinese hacker is found
dead in CIA safehouse. While CIA investigate the
cause of death, some sensitive CIA information are
funneled into Chinese counterpart.
Conclusion
結論
Conclusion
結論
Currently, there are some stratagems which technology
cannot duplicate, yet. But it is just a matter of time when
those bots learned to lie, cheat, and kill one another.
It is possible to narrow thirty six stratagems to 5 – 6
archetypes social engineering which prove following facts
Stratagems should be simple enough to understand when you
realize the pattern
Stratagems should be flexible enough to evolve with changing
environment
Stratagems should be constant in their objective.
Conclusion
結論
• Some of stratagems listed here are indeed both far fetch
and unworkable.
 But when you begin to deal with threats from oversea, you
have to think like your opponents.
• A good strategist hides his motive.
• A better strategist lets other knows his next two moves.
• A great strategist lets other knows his next four moves.

More Related Content

What's hot

Sun tzu presentation
Sun tzu presentationSun tzu presentation
Sun tzu presentationleftax
 
Inside thegurumind suntzu
Inside thegurumind suntzuInside thegurumind suntzu
Inside thegurumind suntzuRichard Go
 
Sun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarSun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarRod Medallion
 
Sun Tzu on Leadership, Strategy and Tactics
Sun Tzu on Leadership, Strategy and TacticsSun Tzu on Leadership, Strategy and Tactics
Sun Tzu on Leadership, Strategy and TacticsTitu Doley
 
Suntzu The Art Of War
Suntzu The Art Of WarSuntzu The Art Of War
Suntzu The Art Of Warinesun9
 
Chinese strategies
Chinese strategiesChinese strategies
Chinese strategiesCrina Feier
 
Art of war-Sun Tzu by a0rn0
Art of war-Sun Tzu by a0rn0Art of war-Sun Tzu by a0rn0
Art of war-Sun Tzu by a0rn0Maruf Aorno
 
Sun Tzu - The Art of War
Sun Tzu - The Art of WarSun Tzu - The Art of War
Sun Tzu - The Art of WarGeorge Grayson
 
Sun tzu – the art of war
Sun tzu – the art of warSun tzu – the art of war
Sun tzu – the art of warAnne Kanusamy
 
He art of war
He art of warHe art of war
He art of wardaleshine
 

What's hot (17)

Sun tzu presentation
Sun tzu presentationSun tzu presentation
Sun tzu presentation
 
Inside thegurumind suntzu
Inside thegurumind suntzuInside thegurumind suntzu
Inside thegurumind suntzu
 
Sun Tzu\'s The Art of War
Sun Tzu\'s The Art of WarSun Tzu\'s The Art of War
Sun Tzu\'s The Art of War
 
Sun Tzu
Sun TzuSun Tzu
Sun Tzu
 
Sun Tzu on Leadership, Strategy and Tactics
Sun Tzu on Leadership, Strategy and TacticsSun Tzu on Leadership, Strategy and Tactics
Sun Tzu on Leadership, Strategy and Tactics
 
Art of war
Art of war Art of war
Art of war
 
Presentation Sun Tzu (the art of war)
Presentation Sun Tzu (the art of war)Presentation Sun Tzu (the art of war)
Presentation Sun Tzu (the art of war)
 
Suntzu The Art Of War
Suntzu The Art Of WarSuntzu The Art Of War
Suntzu The Art Of War
 
Artofwar
ArtofwarArtofwar
Artofwar
 
Art of war san tzu
Art of war  san tzuArt of war  san tzu
Art of war san tzu
 
The art of war
The art of warThe art of war
The art of war
 
Chinese strategies
Chinese strategiesChinese strategies
Chinese strategies
 
The Art of War
The Art of WarThe Art of War
The Art of War
 
Art of war-Sun Tzu by a0rn0
Art of war-Sun Tzu by a0rn0Art of war-Sun Tzu by a0rn0
Art of war-Sun Tzu by a0rn0
 
Sun Tzu - The Art of War
Sun Tzu - The Art of WarSun Tzu - The Art of War
Sun Tzu - The Art of War
 
Sun tzu – the art of war
Sun tzu – the art of warSun tzu – the art of war
Sun tzu – the art of war
 
He art of war
He art of warHe art of war
He art of war
 

Viewers also liked

The Fourth Option - How To Create Winning Career Moves
The Fourth Option - How To Create Winning Career MovesThe Fourth Option - How To Create Winning Career Moves
The Fourth Option - How To Create Winning Career Moveskaimethod
 
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the Future
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the FutureThe Great Escape - 10 Stratagems to Shoot your #TechComm Into the Future
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the FutureStefan Gentz
 
三十六社交工程计 上-简体
三十六社交工程计 上-简体三十六社交工程计 上-简体
三十六社交工程计 上-简体Chuan Lin
 
项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & ChanChuan Lin
 
PMP, InfoSec & Chan
PMP, InfoSec & ChanPMP, InfoSec & Chan
PMP, InfoSec & ChanChuan Lin
 
孫子專案管理
孫子專案管理孫子專案管理
孫子專案管理Chuan Lin
 
孙子项目管理法
孙子项目管理法孙子项目管理法
孙子项目管理法Chuan Lin
 
黃帝內經與資安上部
黃帝內經與資安上部黃帝內經與資安上部
黃帝內經與資安上部Chuan Lin
 
易经与资安 中文版
易经与资安 中文版易经与资安 中文版
易经与资安 中文版Chuan Lin
 
Sunzi's Art of PMP
Sunzi's Art of PMPSunzi's Art of PMP
Sunzi's Art of PMPChuan Lin
 
黄帝内经与信安上部
黄帝内经与信安上部黄帝内经与信安上部
黄帝内经与信安上部Chuan Lin
 
圍棋和資安-中文版
圍棋和資安-中文版圍棋和資安-中文版
圍棋和資安-中文版Chuan Lin
 
易經與資安-中文
易經與資安-中文易經與資安-中文
易經與資安-中文Chuan Lin
 
SECRET ART OF WAR TO CLOSE EVERY SALE
SECRET ART OF WAR TO CLOSE EVERY SALESECRET ART OF WAR TO CLOSE EVERY SALE
SECRET ART OF WAR TO CLOSE EVERY SALEAndy Ng
 

Viewers also liked (14)

The Fourth Option - How To Create Winning Career Moves
The Fourth Option - How To Create Winning Career MovesThe Fourth Option - How To Create Winning Career Moves
The Fourth Option - How To Create Winning Career Moves
 
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the Future
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the FutureThe Great Escape - 10 Stratagems to Shoot your #TechComm Into the Future
The Great Escape - 10 Stratagems to Shoot your #TechComm Into the Future
 
三十六社交工程计 上-简体
三十六社交工程计 上-简体三十六社交工程计 上-简体
三十六社交工程计 上-简体
 
项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan
 
PMP, InfoSec & Chan
PMP, InfoSec & ChanPMP, InfoSec & Chan
PMP, InfoSec & Chan
 
孫子專案管理
孫子專案管理孫子專案管理
孫子專案管理
 
孙子项目管理法
孙子项目管理法孙子项目管理法
孙子项目管理法
 
黃帝內經與資安上部
黃帝內經與資安上部黃帝內經與資安上部
黃帝內經與資安上部
 
易经与资安 中文版
易经与资安 中文版易经与资安 中文版
易经与资安 中文版
 
Sunzi's Art of PMP
Sunzi's Art of PMPSunzi's Art of PMP
Sunzi's Art of PMP
 
黄帝内经与信安上部
黄帝内经与信安上部黄帝内经与信安上部
黄帝内经与信安上部
 
圍棋和資安-中文版
圍棋和資安-中文版圍棋和資安-中文版
圍棋和資安-中文版
 
易經與資安-中文
易經與資安-中文易經與資安-中文
易經與資安-中文
 
SECRET ART OF WAR TO CLOSE EVERY SALE
SECRET ART OF WAR TO CLOSE EVERY SALESECRET ART OF WAR TO CLOSE EVERY SALE
SECRET ART OF WAR TO CLOSE EVERY SALE
 

Similar to Thirty-Six Stratagems of Social Engineering, Part I

Open Model (The Starfish Approach)
Open Model (The Starfish Approach)Open Model (The Starfish Approach)
Open Model (The Starfish Approach)Gabe Mounce
 
Corporate Chanakya
Corporate ChanakyaCorporate Chanakya
Corporate Chanakyamitisha90
 
EMC for business managers
EMC for business managersEMC for business managers
EMC for business managersjhill28590
 
Sun Tzu MS_03 Slds
Sun Tzu MS_03 SldsSun Tzu MS_03 Slds
Sun Tzu MS_03 Sldsgrincha21
 
Essay Proofreading Service Australia
Essay Proofreading Service AustraliaEssay Proofreading Service Australia
Essay Proofreading Service AustraliaMonica Ferguson
 
Adapt, overcome, and improvise words to live by for the supply chain--e parce...
Adapt, overcome, and improvise words to live by for the supply chain--e parce...Adapt, overcome, and improvise words to live by for the supply chain--e parce...
Adapt, overcome, and improvise words to live by for the supply chain--e parce...Thomas Tanel
 
Sun Tzu's Art of War (Special Report)
Sun Tzu's Art of War (Special Report)Sun Tzu's Art of War (Special Report)
Sun Tzu's Art of War (Special Report)trizza_rushel12
 
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...liviubaiu
 
The Terminology of Disaster Terms and How They Define It
The Terminology of Disaster Terms and How They Define ItThe Terminology of Disaster Terms and How They Define It
The Terminology of Disaster Terms and How They Define ItBob Mayer
 
Optimism Essays. Optimism An Essay by Helen Keller 1903 Don Phin Esq.
Optimism Essays. Optimism  An Essay by Helen Keller 1903  Don Phin Esq.Optimism Essays. Optimism  An Essay by Helen Keller 1903  Don Phin Esq.
Optimism Essays. Optimism An Essay by Helen Keller 1903 Don Phin Esq.Ciara Hall
 
An Underground education
An Underground educationAn Underground education
An Underground educationgrugq
 

Similar to Thirty-Six Stratagems of Social Engineering, Part I (20)

Open Model (The Starfish Approach)
Open Model (The Starfish Approach)Open Model (The Starfish Approach)
Open Model (The Starfish Approach)
 
The Universal Treatise of Global Socioeconomic Common Sense/Thomas Paine - Ne...
The Universal Treatise of Global Socioeconomic Common Sense/Thomas Paine - Ne...The Universal Treatise of Global Socioeconomic Common Sense/Thomas Paine - Ne...
The Universal Treatise of Global Socioeconomic Common Sense/Thomas Paine - Ne...
 
The Art of Waging Business War
The Art of Waging Business WarThe Art of Waging Business War
The Art of Waging Business War
 
Corporate Chanakya
Corporate ChanakyaCorporate Chanakya
Corporate Chanakya
 
edge world tips
edge world tipsedge world tips
edge world tips
 
Subject index
Subject indexSubject index
Subject index
 
EMC for business managers
EMC for business managersEMC for business managers
EMC for business managers
 
Sun tzu on recession
Sun tzu on recessionSun tzu on recession
Sun tzu on recession
 
Agile by Sun Tzu
Agile by Sun TzuAgile by Sun Tzu
Agile by Sun Tzu
 
Sun Tzu MS_03 Slds
Sun Tzu MS_03 SldsSun Tzu MS_03 Slds
Sun Tzu MS_03 Slds
 
Essay Proofreading Service Australia
Essay Proofreading Service AustraliaEssay Proofreading Service Australia
Essay Proofreading Service Australia
 
Adapt, overcome, and improvise words to live by for the supply chain--e parce...
Adapt, overcome, and improvise words to live by for the supply chain--e parce...Adapt, overcome, and improvise words to live by for the supply chain--e parce...
Adapt, overcome, and improvise words to live by for the supply chain--e parce...
 
Sun Tzu's Art of War (Special Report)
Sun Tzu's Art of War (Special Report)Sun Tzu's Art of War (Special Report)
Sun Tzu's Art of War (Special Report)
 
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
The Art of Scrum - Agile Principles in ‘Sun Tzu's Art of War’ A BA perspectiv...
 
The Terminology of Disaster Terms and How They Define It
The Terminology of Disaster Terms and How They Define ItThe Terminology of Disaster Terms and How They Define It
The Terminology of Disaster Terms and How They Define It
 
Sun tzu leadership
Sun tzu leadershipSun tzu leadership
Sun tzu leadership
 
Sun tzu leadership
Sun tzu leadershipSun tzu leadership
Sun tzu leadership
 
Optimism Essays. Optimism An Essay by Helen Keller 1903 Don Phin Esq.
Optimism Essays. Optimism  An Essay by Helen Keller 1903  Don Phin Esq.Optimism Essays. Optimism  An Essay by Helen Keller 1903  Don Phin Esq.
Optimism Essays. Optimism An Essay by Helen Keller 1903 Don Phin Esq.
 
An Underground education
An Underground educationAn Underground education
An Underground education
 
10 War Strategies for Peace.pdf
10 War Strategies for Peace.pdf10 War Strategies for Peace.pdf
10 War Strategies for Peace.pdf
 

More from Chuan Lin

大学与​信息安全​
大学与​信息安全​大学与​信息安全​
大学与​信息安全​Chuan Lin
 
Revisit the Three Kingdoms Issue 06
Revisit the Three Kingdoms Issue 06Revisit the Three Kingdoms Issue 06
Revisit the Three Kingdoms Issue 06Chuan Lin
 
Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Chuan Lin
 
Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Chuan Lin
 
專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and ChanChuan Lin
 
Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Chuan Lin
 
Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Chuan Lin
 
三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文Chuan Lin
 
Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Chuan Lin
 
Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Chuan Lin
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSecChuan Lin
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English editionChuan Lin
 
大學與​信息安全​
大學與​信息安全​大學與​信息安全​
大學與​信息安全​Chuan Lin
 

More from Chuan Lin (13)

大学与​信息安全​
大学与​信息安全​大学与​信息安全​
大学与​信息安全​
 
Revisit the Three Kingdoms Issue 06
Revisit the Three Kingdoms Issue 06Revisit the Three Kingdoms Issue 06
Revisit the Three Kingdoms Issue 06
 
Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1
 
Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05
 
專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan
 
Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04
 
Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03
 
三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文
 
Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02
 
Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1
 
Weiqi and InfoSec
Weiqi and InfoSecWeiqi and InfoSec
Weiqi and InfoSec
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English edition
 
大學與​信息安全​
大學與​信息安全​大學與​信息安全​
大學與​信息安全​
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Thirty-Six Stratagems of Social Engineering, Part I

  • 1. Thirty-Six Stratagems of Social Engineering, Part I 三十六社交工程計,上
  • 2. On Stratagems • Stratagems have been around since the age of city states. • They were primary used during wars in ancient times. • They expanded into politic throughout imperial era. • They broaden into commerce amid mercantile period. • And now in the millennium of information age, they are rebranding themselves as social engineering with design to fool hearts & minds of populace. 謀 略 戦 略 전 략
  • 3. On Thirty-Six Stratagems • Stratagems have been used and recorded before the time of Spring and Autumn (771-476 BC) • Tan Daoji, a Liu Song Dynasty general (D 436 AD), had organized, codified and written them down as Thirty-Six Stratagems.  The title itself is a reference to I Ching where six is associated with Yin which represented hidden and intrigues. And thirty-six is square of six, this signifies numerous and interchanging schemes. • Its counterpart was a book called Strategemata which was written by Sextus Julius Frontinus, 1st century Roman senator, who was famous for his deal with aqueducts.  Unfortunately, that book was lost 三 十 六 計
  • 4. Why Thirty-Six Social Engineer Stratagems? • As organization/nation-states are strengthened software and network aspect of cyber defenses, attackers have to look for other ways to access data. • Cyber attacks like all forms of warfare are ever escalating. In 2003, phishing introduced the art of social engineering into information security world. An email, that informed users of their password expiration, has opened up a new battlefront. • For a more sophisticate and escalate data breach, a master plan will be required, numerous stratagems are hatched to deal with various scenario, and vast numbers of bots will provide ample firepower. • An objective for this slide is to provide food for thoughts to InfoSec Pro (Information Security Professions) to recognize patterns and hopefully come up with means to deal with them. 社 交 工 程
  • 5. Requirements for Successful Stratagems (1/3) 1. Understand opponent’s nature  Social Media  News outlets  EmployeesFriendsHaters 2. Understand opponent’s tactic/skills  News outlets  Conventions  Webinars 3. Understand the situation at hand (Comparison of advantages/ disadvantages)  Know your opponent like yourself in order to neutralize their advantages and shore up your disadvantages
  • 6. Requirements for Successful Stratagems (2/3) 4. Reconnaissance  Know your entry and exit points 5. Be highly alert in an unusual situation  Are you been played (See below) 6. Expose weakness to entice opponent  Useful if your opponent is aggressive or hubris  Lower opponent’s guard  Let opponent know your goals or methods
  • 7. Requirements for Successful Stratagems (3/3) 7. Hidden motives and goals  Why make it easy for opponents  Maintain initiative  Allow room for maneuver 8. At a crucial time, strike at their blind side in order to maintain advantages  Their greatest triumph could also be their greatest weakness.  This can apply to you just as well
  • 8. How This Slide Is Presented • Thirty Six Stratagems are divided into 6 Chapters • Each chapter contains six stratagems. • This slide lists thirty-six stratagems but will focus only two stratagems per chapter.
  • 9. Winning Stratagems 勝戰之計 How to use your enemy to your advantages
  • 10. Winning Stratagems 勝戰之計 • Yang element of stratagems  you know exactly of yours and your opponents strengths and/or  you have an advantage • Military talks about utilize force multiplier; here stratagems are talked about force divider.  Force divider are used on your opponent forces  It is about using least amount of resources to achieve greatest amount of wins.
  • 11. List of Winning Stratagems 1. Deceiving heavens, crossing oceans 瞞天過海 2. Besiege Wei, rescue Zhao 圍魏救趙 3. Murder with a borrowed knife 借刀殺人 4. Leisurely wait on laboring enemy 以逸代勞 5. Loot a burning house 趁火打劫 6. Sounding East, Striking West 聲東擊西
  • 12. Besiege Wei, rescue Zhao 圍魏救趙 Explanation It is better to face a divided opponent than a concentrated opponent; it’s better to fight through subtlety than head-to-head. The objective is to force opponent to lose control of situation and initiative. Historical Context Sun Bin, a military strategist of Qi State during Chinese Warring States Period, was ordered to rescue an ally, Zhao State, from hegemon, Wei State. Rather than face the enemy with superiority force and advantages, he attacked Wei’s capital. There, he had no problem defeat the defending army and laid a siege. King of Wei recalled his general who was on the verge of conquering Zhao to return immediately. By the time that general returned to Wei’s capital, Sun Bin had already returned home, and Zhao State was saved.
  • 13. Besiege Wei, rescue Zhao 圍魏救趙 Modern time The objective is to knock InfoSec Pro off what he was doing and have him focus on something else. This forces him to redirect his efforts and incurs lost of times and energies. Modern Scenario Work best against command and control or highly politicized structure where CISO or ISO manager micro managed his staff to an extended that they can’t act without him say so. The game plan is to create an alternate attacks that targeted CEO or C level management. This would work only if there is an inside man or you’re certain that C level machines are compromised.
  • 14. Leisurely Wait on Laboring Enemies 以逸代勞 Explanation Force your opponents into adverse situations that sapped their strength and exhausted their spirits. Then attack them with your fresh force. It is never a good idea to confront foes whose energy and morale are high. It is better to exhaust them while maintain high energy and morale on yourself. Historical Context During Warring States Period, Qin State lunched an invasion against Chu State that was led by a young general. After a series of wins, he became overconfident and fell into ambush that destroyed his force and have him retreated all the way back to Qin. In response, Qin State send an elder general who stopped at the border of Qin and Chu and build up his defense. While Chu troops wanted a quick decisive battle, Qin troops hid behind fortress. When Chu force exhausted their supplies and withdrawal, Qin troops attacked from behind and annihilated them. Chu State was eliminated soon after .
  • 15. Leisurely Wait on Strained Enemies 以逸代勞 Modern Time This stratagem supports the idea of taking control of the situation from InfoSec Pro. This is done by exhausting him to the point of making a wrong call, oversight, overreact, overreach, etc… While direct confrontation (against an active opponent) is exciting and generate much buzz, it also drained and tied up both resources (even if those resources are hijacked) and time. Modern Scenario A series of false positives at various sources and locations can require InfoSec Pro’s immediate attention. Or even like the historical context, pose an imminent threat that he can see it coming and have him waiting. However, in this case, with modern technology, InfoSec Pro can afford and do welcome the wait as this allows him to shore up his defenses as well.
  • 17. Enemy Dealing Stratagems 敵戰之計 • Yin element of stratagems  you do not know your opponents strengths and/or  you are in a disadvantage • Initial contact with opposing force  Probing attacks/recons  Verify how opponents response before and after an attack
  • 18. List of Enemy Dealing Stratagems 1. Create something from nothing 無中生有 2. Openly repairing the road, sneaking through the back 明修棧道,暗渡陳倉 3. Watch fires burn, across the river 隔岸觀火 4. Hiding a knife behind a smile 笑裡藏刀 5. Sacrifice a plum, preserve a peach 李代桃僵 6. Take an opportunity to pilfer a goat 順手牽羊
  • 19. Watch fires burn, across the river 隔岸觀火 Explanation When there is a conflict within enemy camp and chaos ensures, it is best to sit back and watch. Wait till their internal conflicts deepened which would deepened hatred among them. It would turn into violence and its aftermath, the enemy would be much weaken. Then it is the time to act. Historical Context During Three Kingdoms period, Cao Cao had defeated Yuan Shao who soon passed away without naming an heir. Through political maneuver, the youngest son became the lord which undoubtedly caused resentments with the other two. When Cao Cao attacked again, his force was repelled because of united Yuan front. Under advice from his staff, Cao Cao waited. Soon, sons bickered among themselves and split into factions. Next time Cao Cao attacked, his opponents were much weaker and he was able eliminated Yuan faction altogether.
  • 20. Watch fires burn, from the river 隔岸觀火 Modern Time In most companies, there exists an unease tension between InfoSec Pro with Network, InfoSec Pro with IT, or InfoSec Pro with rest of employees. And in most instances, InfoSec Pro has to play the bad guy by saying No to things that used to take for granted. Attackers can exploit such tension and cause it to erupt into actual office politics causalities. No matter who win or lose, office morale will always decrease and this present an ideal time to strike. Modern Scenario After a successful attack against an highly politicized work environment, send a city-wide email thanking the InfoSec Pro for making it happen. Even if it is not lit up immediately as the spark for employee review, the seed of doubt is incepted.
  • 21. Take an opportunity to pilfer a goat 順手牽羊 Explanation When one saw a stray sheep in the opening, he’s tempted to shepherd it home. So is taking an opportunity when it presents itself no matter how small it is, it will just lead to something bigger. Alternatively, take advantage of someone’s opportunistic nature to cause great harm. Historical Context During Spring & Autumn Period, a Qi minister helped a prince to become Lord of Qi State. But the new Qi Lord was lecherous and soon had numerous affairs with the minister’s wife. Eventually, the minister found out. Under pretext of being ills, he’s unable to attain his duty. When the lord knew, he went to minister’s home under the pretense of inquiring minister’s health. Instead he went to wife’s chamber. After she excused herself, the lord was trapped and soon killed.
  • 22. Take a sheep on the way out 順手牽羊 Modern Time This is one of most commonly used social engineering techniques in the modern time. Under guise of free, people will download anything and everything to take advantage of it. Another variation is to give away free USB, micro-SD cards, or Thunderbolt drive to prospective clients.
  • 24. Attacking Stratagems 攻戰之計 • Yang element of stratagems  you know exactly of yours and your opponents strengths and/or  you have an advantage • Frontal attacks when they know you are coming  How to get around their defenses  How to direct your maximum force against their weakest point.
  • 25. Summary of Attacking 1. Stomping grass, scaring snake 打草驚蛇 2. Borrow a corpse to resurrect a soul 借屍還魂 3. Entice the tiger to leave its mountain 調虎離山 4. Capture through Release 欲擒故縱 5. Trading a brick for a jade 拋磚引玉 6. Defeat enemy through their chief 擒賊擒王
  • 26. Borrow a corpse to resurrect a soul 借屍還魂 Explanation Something useful shouldn’t be loaned; something not useful should be borrowed; use only borrowed useless thing. It is not me who sought out the child, but the child sought me out. Even if you have overwhelm force, never display it or utilize it unless absolute necessary. By remain hidden, it created doubt and uncertainty in your enemies who wondered where would you strike. Rather, use something insignificant and something borrow, it draw off attention and allow you to increase your sphere of influence. Historical Context During Three Kingdoms period, Liu Bei sought out sanctuary with a follow kinsman and a lord. While the lord agreed, his two loyal ministers were worried, Liu Bei was infamous for bringing downfall to those who helped him. They decided to assassinate Liu Bei. But their plan was leaked. When they arrived to Liu Bei’s camp, they were welcome and a festival was made in honor of upcoming alliance. During middle of celebration, Liu Bei confided to two assassins that he had secret military plan to share with them. When they came to his tent, Liu Bei’s troops seized them, searched and found hidden daggers. Assassins were beheaded and Liu Bei announced to accompany troops that he feared for their lord’s safety and asked them to return. Troops were followed by Liu Bei’s force. At the city gate, guards recognized returned troops and opened the gate. Liu Bei’s force rushed in. The coupe was completed.
  • 27. Borrow a corpse to resurrect a soul 借屍還魂 Modern Time Technology wise, this can associate to Trojans and Zombies malware. Social Engineer, this is often refer to identity theft. Modern Scenario
  • 28. Capture through Release 欲擒故縱 Explanation Fighting when corner; fleeting when weaken; give chase but do not strain; exhausted their energy, drained their spirits; then captured them through disbursement. Troops do not need to blood their blades. Troops will fight to death when they have nothing to lose. Between flee for life or fight to death, they will chose to live. Low morale is infectious and longer it germinated, the more damaging it can cause. Low morale, tired, and exhausted, they would give up rather than keep on fighting. Historical Context In the novel, Romance of the Three Kingdoms, before Zhuge Liang could carry war against Wei State, he must pacify his southern front where local lord, Meng Huo, had rebelled after the death of Liu Bei. Zhuge Liang had captured Meng Huo seven time, but each time, he chose to let the rebel leader go because he wanted to break the rebel spirit. Despite been released, his new found insights weren’t accepted by his allies who thought of him as a loser. By the seventh capture, Meng Huo knew Zhuge Liang was indeed a master strategist and submitted.
  • 29. Capture through Release 欲擒故縱 Modern Time A modern equivalent is the Man in the Middle Attack. This allows attackers to continue gathering more information by release captured data/transaction. In social engineering, Capture through Release is like tagging a target. That target becomes the carrier. Through him, the company internal system can be compromised; the company incident response can be revealed; the company key individuals can be identified. Modern Scenario
  • 31. Chaos Stratagems 混戰之計 • Yin element of stratagems  you do not know your opponents strengths and/or  you are in a disadvantage • When an attack becomes a stalemate or attrition  How to deal with defensive-in-layers concept  How to fight them individually without being gang-on.
  • 32. Summary of Chaos 1. Remove firewood from boiling pot 釜底抽薪 2. Catch a fish through muddle water 混水摸魚 3. Shedding cicada’s golden shell 金蟬脫殼 4. Shut the door to catch a thief 關門捉賊 5. Befriend a distant state while attacking a neighboring state 遠交近攻 6. Obtain safe passage to conquer the State of Guo 假道伐虢
  • 33. Remove firewood from boiling pot 釜底抽薪 Explanation If one can’t defeat opposing force, then one has to remove the opposing force multiplier. Tis the image of a swamp below and force on top. If enemy force is much stronger than yours, then you’ll need to destroy the source of his force multiplier in order to even the odd. The last statement referenced to I- Ching indicates that swamp is at the bottom because of cyclical and regulated order. It’s logical step is to move up. Historical Context During Northern Song Dynasty, guards at Han Province rebelled by raiding and pillaging. They attempted to kill both provincial governor and military police commissioner who were frighten and hid. A local magistrate walked out and faced rebelling troops. He declared, “You all have wife, parents and children. Why are you taking such risk? Step aside if you want no part of it!” Only eight people remained in the center who fled to countryside. But soon they were captured and executed.
  • 34. Remove firewood from boiling pot 釜底抽薪 Modern Time Technology: Through recon, a potential target company has array of defense in layers that would make a frontal attack long, brutal, and obvious. What are their force multipliers? How do you reduce those layers? Do they have zero day exploits? Social Engineering: The company’s InfoSec are well versed in blue team defense such as incident detection, security analysts and forensic analysts. But let’s focus on their staff? Do they have any needs that are unmet by their company?
  • 35. Befriend a Distant State, Attack a Nearby State Explanation Location determines degree of threats, profits from close reach; loss from distance reach. Fire at top, swamp at bottom. “Location, location, location” is not just a real estate slogan but also a strategic factor. Maximum gain comes from short campaign. Maximum loss comes from long campaign. Therefore to conserve forces, it is better to attack nearby than to commit troops afar. Not to mention the fact that it is better to attack a country than a group of countries. Historical Context During the Warring States Period, Qin State adopted this stratagem as it began to eliminate other countries. It made offers to distant states to isolate nearby states prior invasion. Even if someone from other 6 states saw through this stratagem, the distrust among them had prevented any attempt to unite against Qin State. In 221 BC, Qin State has united China after 254 years of warfare and became known as Qin Dynasty. 遠 交 近 攻
  • 36. Befriend a Distant State, Attack a Nearby State Modern Time Technology: While it is true that internet has make irrelevant of distance as a factor, but it is relevant during aftermath of an attack. It is far harder to extradite a hacker to another state especially if he is perceived to be a local favorite son. Socially: Distance as a factor is interpreted as where InfoSec is in a company’s organizational hierarchy. While he may have influence and able to enforce security on those around him, but people further above and below might not be affected as much. 遠 交 近 攻
  • 38. Proximate Stratagems 並戰計 • Yang element of stratagems  you know exactly of yours and your opponents strengths and/or  you have an advantage • Even if you have an overwhelm force, how to further minimalize your loss.  Play defensively to conserve your strength  Play defensively to demoralize your opponent forces
  • 39. Summary of Proximate 1. Replace beams with rotten timbers 偷梁換柱 2. Pointing mulberry tree while cursing locust tree 指桑罵槐 3. Feign madness in order to maintain sanity 假癡不癲 4. Remove ladder after an enemy ascended the roof 上屋抽梯 5. Deck the tree with false blossoms 樹上開花 6. Switch from guest to host 反客為主
  • 40. Replace Beams with Rotten Timbers 偷梁換柱 Explanation Increased frequent change of opponent’s forces in order to embedded and weakened his strongest force; waited till it collapsed on its on violation, after which, one is able to control it like directing the wheels of a moving cart. In the age of outsourcing human and technical resources, there is a chance of inserting bugged talent and/or product. As these assets moved around the company, this creates more opportunities to weaken command and control structure until such that outsider can gain administrator access. Historical Context Qin Shin Huang, the first emperor of historical China, had two sons. Though he favored the elder, he did not name him his heir apparent because he thought he would live a long live. When his sudden terminal illness came, Qin Shin Huang issued the imperial decree to name his elder son as the heir. He died soon after. His death remained a secret by pro-second son Prime Minster. The Head Eunuch, also a pro- second son faction, had the imperial decree and he conspired with Prime Minster. Together, they redrafted the imperial decree to declare the second son as the new emperor and forced the first son to commit suicide. Thus the fate of Qin Dynasty was sealed.
  • 41. Replace Beams with Rotten Timbers 偷梁換柱 Modern Time Technology: Man in the Middle (MitM) is a popular hack that allowed attackers to embed into target’s communication system in order to gain control and cause misdirection. Keylogger is another variation of MitM. Socially: Purchasing reputable third-party security software can eliminate and reduce the influence of MitM. But unlike software, consultants from reputable third party firm do not necessary guarantee the same result. While over 99% of them are ethical and professional, it is the remaining few that can be disruptive. Also as historical context had shown, a company’s office politic can also have an impact on its information security.
  • 42. Deck the Tree with False Blossoms 樹上開花 Explanation Using surrounding to enhance your threats; even if your force is small, your threat will magnify. As wild geese flew in pattern, theirs feathers and formation swell. A popular acronym in computer world is FUD (fear, uncertainty, and doubt) which is used whenever one described the emotion of dealing with unknown. Used your opponents emotion against them by immerse them into unfamiliar territory. Historical Context During The Three Kingdoms Period, Cao Cao attacked Jing Province upon hearing the news of its lord passing. Liu Bei had sought refuge at Jing Province and immediately retreated further south when he got wind of the attack. But people followed him and burdened his force. When Cao Cao’s army almost caught up to them, Zhang Fei with thirty some troops acted as Liu’s rear guards. Zhang Fei had his troops hidden in the wood and caused great commotion while he stood by the narrow bridge. Cao Cao troops paused at the other side of the bridge when they saw Zhang Fei by himself, but noises came from the woods. Fearing an ambush, they waited until such time that Lie Bei was able to withdraw his force in safety.
  • 43. Deck the Tree with False Blossoms 樹上開花 Modern Time Technology: FUD is quite common theme in information world. Even the thought of switching or supporting a different OS would generate such FUD among general users. It will not take much to generate hysteria from common users. Socially: Stress from work, office politics, and economy are building blocks to FUD hysteria. Social media such as twitter, 4chan, and facebooks can spread FUD like a virus in a congested community. A modern equivalent is the False Flag.
  • 45. Desperate Stratagems 敗戰之計 • Yin element of stratagems  you do not know your opponents strengths and/or  you are in a disadvantage • How to win even when you are outnumbers  This is risky because if you lose, you’ll lose big.  Stratagems are about how to get out of confrontation and how to live and to fight in another day.
  • 46. Summary of Desperation 1. The Beauty Trap 美人計 2. The Empty Fort Strategy 空城計 3. Turned Agent Strategy 反間計 4. Self inflected Wound 苦肉計 5. Chain Strategms 連環計 6. Retreat 走為上策
  • 47. Turned Agent Strategy 反間計 Explanation Create doubt within doubts, using enemy spies against them is much more profitable than embedded our own against them. This is the battle of social engineer in highest form. Can you feed false information to your opponent through their agents? For a successful attacks, a recon of target area is a necessity. The game here is how to recognize a recon and then feed them with false data that led them to honeypot or dead zone. Historical Context In the novel, Romance of The Three Kingdoms, at the Battle of Red Cliff, Cao Cao had overwhelm force against both Liu Bei and Sun Quan. Despite Cao troops were unfamiliar with navy warfare, Cao had subjugated two new admirals to help train for naval warfare. At the same time, he send an agent over to persuade Zhou Yu to defect. Zhou Yu recognized his old friend and realized that he was an agent of Cao. While pretended to listen to his old friend, he leaked false information about those two new admirals were agents of Sun. His friend quickly departed and informed Cao Cao of such news. In fit of rage, those two admirals were summarily beheaded. And only then did Cao Cao realize that he had been played.
  • 48. Turned Agent Strategy 反間計 Modern Time Technology: Technology isn’t here yet, but it may be a matter of time for someone to develop a bot that will fool another bot by dissimilate false data . Socially: Few companies have provided varied information to different key members. And by reviewed type of data leaked, they will know who is the mole.
  • 49. Self inflected Wound 苦肉計 Explanation A person does not hurt himself, and if he is wounded, then this is less likely to be caused by self injury. Whether it’s fake or real, or real or fake, it is now possible to carry out a plan. Even a man-child can get lucky when follow this plan through. This strategy goes opposite with the saying, “enemy of my enemy is my friend”. Whether through religion or culture, we, in general, do not believe in self-inflict wound and tend to believe that it’s someone else doing. As such, we lower our guard toward the victim. Historical Context During the Spring and Autumn Period, Lord of Zheng State wanted to annex Hu State. He first married off his daughter to Lord of Hu State. He executed the leader of anti-Hu State faction in his court. These acts have lessen the guard Hu State had against Zheng State. This allowed Zheng State to led a surprise attack against Hu State and annexed that dominion once and for all.
  • 50. Self inflected Wound 苦肉計 Modern Time Technology: Fake apps that claimed to help prevent any ransomware or Zeus malware. While it did remove other hackers malware, it also introduced its own variant of ransomware or Zeus malware. Modern Time Socially: A variant of Edward Snowden playbook could be a Chinese hacker fled from Chinese government’s prosecution by confirmed what the West had accused China of doing. By doing so, he sought for US government protection. The hacker’s family have been prosecuted and imprisoned. There was a successful attempt on the hacker’s life. It also has caused a diplomatic low point between China and US. While China is adamant for returned of this Chinese hacker, CIA had confirmed that this individual had brought over secrets that they wanted but unable to take. And he is moved to CIA safehouse. A couple days later, this Chinese hacker is found dead in CIA safehouse. While CIA investigate the cause of death, some sensitive CIA information are funneled into Chinese counterpart.
  • 52. Conclusion 結論 Currently, there are some stratagems which technology cannot duplicate, yet. But it is just a matter of time when those bots learned to lie, cheat, and kill one another. It is possible to narrow thirty six stratagems to 5 – 6 archetypes social engineering which prove following facts Stratagems should be simple enough to understand when you realize the pattern Stratagems should be flexible enough to evolve with changing environment Stratagems should be constant in their objective.
  • 53. Conclusion 結論 • Some of stratagems listed here are indeed both far fetch and unworkable.  But when you begin to deal with threats from oversea, you have to think like your opponents. • A good strategist hides his motive. • A better strategist lets other knows his next two moves. • A great strategist lets other knows his next four moves.