3 Hacking Skills EVERYONE has // FREE Security+ // EP 1
Based on NetworkChuck's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Recon often starts with publicly available information from social media and search, then gets repurposed for phishing, malware delivery, or impersonation.
Briefing
Social engineering attacks often start with skills “everyone already has,” and the most effective defenses begin by treating everyday behavior—what gets posted, what gets thrown away, and what can be overheard—as part of an organization’s security perimeter. The core message is blunt: attackers don’t need to break into computers first. They can gather enough information about a person or company to set up later phishing, malware delivery, or impersonation, using publicly available data and human observation.
The first skill is reconnaissance (recon): collecting information about a target before any direct attack. Recon can be as simple as “snooping” through public social media profiles—Facebook, LinkedIn, and Twitter—where people voluntarily share details about their identity, beliefs, friends, workplaces, and even technologies they use. That information can be weaponized. Knowing someone likes a specific topic can help craft convincing emails that lead to malicious downloads. Details about friends can enable impersonation, letting an attacker message a target as if they were a trusted contact. For companies, recon can reveal the tools and infrastructure a business uses—such as Cisco-related technologies—giving attackers clues about potential weaknesses and how defenses are structured.
This recon phase also scales through open-source intelligence (OSINT), which relies on information already available on the internet. The transcript highlights tools and methods that automate discovery: OSINT frameworks that search for usernames across platforms; advanced Twitter search tools like Twint to pull lists of tweets by username, time window, or even location; and services like Hunter.io that can generate lists of real email addresses tied to a company’s domain. Even “Google hacking” (Google dorking) is presented as a way to find public information that may be unintended for broad exposure.
The second skill is dumpster diving—digging through trash or discarded materials to recover sensitive data. While the transcript notes that this is often not illegal in many places because trash is public domain, the risk is real: mail can contain names, addresses, and pre-approval details that help attackers tailor scams; companies may discard documents with passwords, email lists, purchase orders, or other “harmless” paperwork that becomes valuable in the wrong hands. The practical defense is straightforward: shred documents, and for computers and hard drives, use proper third-party disposal that wipes data.
The third skill is shoulder surfing, the act of watching someone enter passwords, view screens, or read messages. It’s not limited to someone standing behind a keyboard. It can happen in public spaces like coffee shops, on phones in line, or at ATMs where passcodes and card details are visible. The transcript also expands the concept to eavesdropping—listening to conversations in public places where technical buzzwords and workplace details can reveal what teams are doing, what systems they use, and when employees will be available.
Across all three skills, the defense is education and discipline: assume online information is discoverable even when privacy settings are enabled; train employees not to overshare company details; control what gets discarded; and reduce opportunities for observation by limiting screen and passcode exposure. The takeaway is that social engineering is psychological and accessible—hard to stop because it depends on people, not just technology—and it sets the stage for more damaging attacks afterward.
Cornell Notes
The transcript argues that social engineering attacks often begin with three non-technical skills: recon, dumpster diving, and shoulder surfing. Recon uses open-source intelligence (OSINT) to collect personal and company details from public sources like Facebook, LinkedIn, and Twitter, then repurposes that data for phishing, malware delivery, or impersonation. Dumpster diving targets sensitive information left in trash, including mail and discarded documents, while shoulder surfing captures passwords, screens, and even workplace conversations in public settings. Because these tactics rely on human behavior and observation, the most practical defenses are behavioral: limit what’s posted, shred and properly dispose of sensitive materials, and prevent others from seeing screens and passcodes. The stakes are high because these early steps can enable later, more damaging attacks.
How does reconnaissance (recon) turn everyday online information into an attack advantage?
What is OSINT, and why do tools like OSINT frameworks, Twint, and Hunter.io matter?
Why is dumpster diving risky even when the information seems ordinary?
What counts as shoulder surfing beyond someone watching a password at a desk?
What practical habits does the transcript recommend to reduce exposure to these tactics?
Review Questions
- Which specific types of personal or company details gathered during recon are most likely to support phishing or impersonation?
- How do dumpster diving and shoulder surfing differ in the kind of information they harvest, and what defenses address each?
- What role do OSINT tools play in scaling social engineering, and what does that imply for personal privacy settings?
Key Points
- 1
Recon often starts with publicly available information from social media and search, then gets repurposed for phishing, malware delivery, or impersonation.
- 2
OSINT tools automate discovery across platforms, including username mapping, location-based social searches, and domain-based email harvesting.
- 3
Dumpster diving can recover sensitive data from trash—especially mail and discarded documents—making shredding and proper disposal essential.
- 4
Shoulder surfing includes watching screens and passcodes in public, plus eavesdropping on workplace conversations that reveal technical details.
- 5
The most effective defenses are behavioral: limit what’s posted online, train employees not to overshare company information, shred sensitive materials, and reduce opportunities for observation.
- 6
Because these tactics depend on human behavior, they can be hard to stop with technology alone; education and process matter.