Social Engineer
Kevin Mitnick. You may have heard the name.
For our generation he was a legendary hacker. The FBI hunted him. After his arrest he was forbidden from even owning a computer. You might assume he pulled off something technically advanced. His real skill was social engineering. One phone call, a fake identity, a password extracted, a data center entered. He did not break through technology. He broke through people.
By today's standards you wonder whether it even counts as hacking.
Break down his methods and the structure is simple. Project authority. Manufacture urgency. Leave the target no time to think. "This is HQ systems. We need your account credentials for emergency maintenance." Today everyone would smell a scam. Back then it worked. The very concept of security awareness barely existed.
Social engineering sounds technical. Its anatomy is identical to ore-ore sagi — the classic Japanese phone scam. Fake authority. Manufactured urgency. Judgment stripped away. Mitnick calling a sysadmin and a scammer calling a retiree with "Your son has been in an accident" share the same skeleton as social hacks.
After prison Mitnick reinvented himself as a security consultant. An attacker's perspective is rare and valuable. His books repeat one line: the weakest link is always human. Firewalls, WAFs, zero trust — all meaningless the moment someone on the phone reads a password aloud.
As engineering it is spectacularly unimpressive. That it remains the most effective attack vector is the most unimpressive part of all.