Human Hacking audiobook cover - Win Friends, Influence People, and Leave Them Better Off for Having Met You

Human Hacking

Win Friends, Influence People, and Leave Them Better Off for Having Met You

Christopher Hadnagy with Seth Schulman

4.5 / 5(325 ratings)

If You're Curious About These Questions...

You should listen to this audiobook

Listen to Human Hacking — Free Audiobook

Loading player...

Key Takeaways from Human Hacking

Learning Tools

Reinforce what you learned from Human Hacking

Mind Map

Human Hacking
Core Philosophy+
Self-Mastery & Profiling+
Pretexting (PREPARE)+
Rapport Building+
Principles of Influence+
Elicitation Techniques+
Nonverbal Communication+
Avoiding Manipulation+
Active Listening+

Quiz — Test Your Understanding

Question 1 of 10
According to the author, what is the core ethical principle of 'human hacking' that distinguishes it from criminal hacking?
  • A. It focuses on achieving results regardless of the emotional cost to the subject.
  • B. It requires a pledge to leave others better off for having met you.
  • C. It relies exclusively on emotional hijacking to compel compliance.
  • D. It is only used by security professionals to test corporate vulnerabilities.
Question 2 of 10
What does the author suggest you must do before you can effectively assess and influence others?
  • A. Master your own natural communication tendencies.
  • B. Create a completely neutral and emotionless persona.
  • C. Establish dominance early in the conversation.
  • D. Memorize a rigid script for all social encounters.
Question 3 of 10
In the context of the PREPARE framework, what is the purpose of 'pretexting'?
  • A. To bypass security protocols by pretending to be an authority figure.
  • B. To create an advantageous context and emotional atmosphere for a successful interaction.
  • C. To overwhelm the subject with facts and data so they agree to your request.
  • D. To send brief, context-free messages that keep the other person guessing.
Question 4 of 10
When trying to build rapport with a stranger on the street, what subtle tactic does the author recommend?
  • A. Asking deeply personal open-ended questions to establish immediate intimacy.
  • B. Standing directly in their path so they are forced to stop and engage.
  • C. Inventing artificial time limits so they know the interaction will be brief.
  • D. Offering them a small monetary gift to trigger the reciprocation principle.
Question 5 of 10
How did the author successfully use the principle of reciprocation to get a receptionist to let him into an executive office?
  • A. He offered her a bribe in exchange for access.
  • B. He warned her that her boss was coming while she was playing a game, making her feel indebted.
  • C. He proved he was a security expert hired by the company to test their systems.
  • D. He complimented her outfit, which boosted her mood and prompted an upgrade.
Question 6 of 10
What is 'elicitation' in the context of human hacking?
  • A. A technique for aggressively interrogating someone until they reveal the truth.
  • B. A method of mimicking someone's body language to build subconscious trust.
  • C. A tactic of prompting people to divulge information without directly asking them a question.
  • D. A manipulation strategy that uses fear to shut down a person's critical thinking.
Question 7 of 10
According to the book, what is a highly effective way to use elicitation to find out someone's birthday or personal details?
  • A. Making a false or nonsensical statement to prompt them to correct you.
  • B. Staring at them silently until the awkwardness compels them to speak.
  • C. Asking them a series of rapid-fire 'yes or no' questions.
  • D. Briefly showing them your own ID card.
Question 8 of 10
What do 'ventral displays'—such as showing the underside of wrists or tilting the belly toward someone—indicate in nonverbal communication?
  • A. A formal, authoritative presence designed to command respect.
  • B. Defensiveness and a desire to immediately end the conversation.
  • C. Deception and an attempt to hide one's true intentions.
  • D. Openness, comfort, and an eagerness to be friendly.
Question 9 of 10
Why do scammers and manipulators often try to elicit strong negative emotions like fear or pain?
  • A. It activates the amygdala, which shuts down critical thinking and increases susceptibility.
  • B. It triggers the release of oxytocin, making the victim more generous.
  • C. It encourages the victim to ask reflective questions and engage deeply.
  • D. It builds long-term trust and ensures mutual benefit.
Question 10 of 10
What actionable advice does the author provide to help build a habit of active listening?
  • A. Nod continuously and maintain unbroken eye contact while the other person speaks.
  • B. Interrupt the person every two minutes to summarize their main points.
  • C. Repeat the last three or four words someone says and pose them as a reflective question.
  • D. Mirror the exact posture of the speaker for the first thirty seconds of the conversation.

Human Hacking — Full Chapter Overview

Human Hacking Summary & Overview

Human Hacking (2021) is a guide to the art of ethical social engineering. Using the same tools of psychology and influence deployed by security hackers, it demonstrates how to boost social interactions in daily life. It covers a range of tips on how to adjust your natural communication tendencies to steer encounters to your advantage, with practical tools on how to influence others using empathy and compassion.

Who Should Listen to Human Hacking?

  • Those interested in becoming more persuasive
  • People interested in making new friends
  • Anyone interested in social engineering

About the Author: Christopher Hadnagy with Seth Schulman

Christopher Hadnagy is a global security expert and founder of Social-Engineer, LLC. He is the best-selling author of multiple technical books for security professionals, including Social Engineering: The Art of Human Hacking and Social Engineering: The Science of Human Hacking

🎧
Listen in the AppOffline playback & background play
Get App