<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Omar Shraideh</title>
    <description>The latest articles on Forem by Omar Shraideh (@omar-shraideh).</description>
    <link>https://forem.com/omar-shraideh</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3343936%2F3a886544-c332-4df8-ac0b-0252f47f9366.jpg</url>
      <title>Forem: Omar Shraideh</title>
      <link>https://forem.com/omar-shraideh</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/omar-shraideh"/>
    <language>en</language>
    <item>
      <title>Social engineering (Human Hacking)</title>
      <dc:creator>Omar Shraideh</dc:creator>
      <pubDate>Sat, 12 Jul 2025 13:24:44 +0000</pubDate>
      <link>https://forem.com/omar-shraideh/social-engineering-human-hacking-4lhp</link>
      <guid>https://forem.com/omar-shraideh/social-engineering-human-hacking-4lhp</guid>
      <description>&lt;p&gt;What I Learned from The Art of Human Hacking book by Christopher Hadnagy&lt;br&gt;
Hello everyone,&lt;/p&gt;

&lt;p&gt;Today I finished reading The Art of Human Hacking by Christopher Hadnagy, and I wanted to share some of the insightful information that I gained from it.&lt;/p&gt;

&lt;p&gt;Let's start with the basics: What is social engineering?&lt;/p&gt;

&lt;p&gt;Social engineering is the art of controlling how humans naturally think, make decisions, and behave — and using that to exploit vulnerabilities. It's not just a soft skill. It's a powerful weapon that can be used in nearly every area of life, especially in cybersecurity.&lt;/p&gt;

&lt;p&gt;On its most basic level, social engineering (SE) takes advantage of how our brains are wired — namely the influence of two fundamental hormones:&lt;/p&gt;

&lt;p&gt;Oxytocin: the "trust" hormone || Dopamine: the "pleasure" hormone&lt;/p&gt;

&lt;p&gt;Hadnagy separates the process of a social engineering attack into a five-step pyramid:&lt;/p&gt;

&lt;p&gt;OSINT || Pretext Development || Attack Planning || Attack Execution || Reporting and Documentation&lt;/p&gt;

&lt;p&gt;Each of these steps is explored in detail in the book. But What if something goes wrong and derails your plan? Maybe the security guard is not the same, the office has been reorganized, or a key you were relying on no longer functions. That's when you call on Plan B: profile through communication.&lt;/p&gt;

&lt;p&gt;One of the methods the book instructs is DISC profiling, where you assess an individual's communication style and behavior at that moment. And a golden rule? Focus on your target, not yourself, especially when communicating. Listen for the R.S.V.P. of communication:&lt;/p&gt;

&lt;p&gt;Rhythm || Speed || Volume || Pitch&lt;/p&gt;

&lt;p&gt;The book is chock-full of principles, examples, and strategies difficult to condense into a single post — but these are just some takeaways.&lt;/p&gt;

&lt;p&gt;My Review:&lt;br&gt;
I thoroughly enjoyed this book. What amazed me most was the fact that each principle is followed by real-world examples, so not only is it easier to understand but also to implement and relate. I would highly recommend it to anyone interested in social engineering, cybersecurity, or even human psychology for that matter.&lt;/p&gt;

&lt;p&gt;Remember:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The biggest vulnerability in cybersecurity is not a machine — it's the human.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I will be helping you in your journey do let’s Connect&lt;br&gt;
I like assisting new people and sharing tips from my experience and we will be discussing another topics from your choice .&lt;br&gt;
You can contact or follow me:&lt;/p&gt;

&lt;p&gt;Linkedin : &lt;a href="https://www.linkedin.com/in/omar-shraideh/" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/omar-shraideh/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;instagram : omar.shraideh_&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>ai</category>
      <category>programming</category>
    </item>
    <item>
      <title>How to become a “HACKER”</title>
      <dc:creator>Omar Shraideh</dc:creator>
      <pubDate>Fri, 11 Jul 2025 01:08:01 +0000</pubDate>
      <link>https://forem.com/omar-shraideh/how-to-become-a-hacker-1k8g</link>
      <guid>https://forem.com/omar-shraideh/how-to-become-a-hacker-1k8g</guid>
      <description>&lt;p&gt;Hey, everyone!&lt;br&gt;
I’m Omar Shraideh, and I’ve been in cybersecurity for nearly three years. I didn’t come from a tech family or go to thousand-dollar boot camps. I started with curiosity, self-discipline, and an internet connection.&lt;/p&gt;

&lt;p&gt;But it wasn’t all smooth sailing.&lt;/p&gt;

&lt;p&gt;The Mistake I Made Early On&lt;br&gt;
When I first began, I took the wrong route !&lt;/p&gt;

&lt;p&gt;I was enticed by shiny YouTube videos and clickbait.&lt;/p&gt;

&lt;p&gt;“How to hack a company in 2 minutes!”&lt;br&gt;
“Become a hacker overnight!”&lt;/p&gt;

&lt;p&gt;It wasn’t six months in before I realized:&lt;br&gt;
That wasn’t learning — that was wasting time.&lt;/p&gt;

&lt;p&gt;Those shortcuts only equal going around in circles. There were no real skills, no real knowledge, only hype.&lt;/p&gt;

&lt;p&gt;✅ The Right Way to Get Started in Cybersecurity&lt;br&gt;
If I ever received a second opportunity in time, this is exactly how I would start — and you should as well if you are serious:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Start with the Basics
Don’t go jumping into hacking or tools before understanding how systems work.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;CompTIA Security+ (Sec+) — to build your security basics&lt;/p&gt;

&lt;p&gt;CompTIA Network+ (N+) — to learn the networking basics&lt;/p&gt;

&lt;p&gt;Some prefer CCNA, but N+ is enough at the starting point.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Move into Hands-on Skills
Once the groundwork is established, it’s time to roll up your sleeves.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;eJPT (eLearnSecurity Junior Penetration Tester)&lt;br&gt;
A beginner-friendly red team certificate based on real-world ethical hacking techniques.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select Your Path
You should now decide where you belong:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Red Team (Attacker) — Penetration testing, ethical hacking, adversary simulation&lt;/p&gt;

&lt;p&gt;Blue Team (Defender) — Threat detection, incident response, SOC operations&lt;/p&gt;

&lt;p&gt;Don’t rush into anything — study both, but ultimately, specialize.&lt;/p&gt;

&lt;p&gt;My Aspiration Is to Prevent You from the Deceptions&lt;br&gt;
I’ve written this post not to boast, but to spare you time. I understand what it’s like to be lost — particularly when you’re just getting started and everyone seems to be ahead of you.&lt;/p&gt;

&lt;p&gt;If you stick with it and take an actual path (not clever tricks), you will win.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fffx952znoizxp5qb3bsl.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fffx952znoizxp5qb3bsl.jpg" alt=" " width="749" height="499"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I will be helping you in your journey do let’s Connect&lt;br&gt;
I like assisting new people and sharing tips from my experience and we will be discussing another topics from your choice .&lt;br&gt;
You can contact or follow me:&lt;/p&gt;

&lt;p&gt;Linkedin : Omar Shraideh | LinkedIn&lt;/p&gt;

&lt;p&gt;instagram : omar.shraideh_&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
