Chris Hadnagy is the author of Human Hacking: How to Win Friends, Influence People, and Leave Them Better Off for Having Met You. In this book, he takes the social engineering principles con men and malicious social hackers use to breach security systems and steal data, and shows the average person how to use them for positive ends in their personal and professional relationships. Today, on the show, Chris shares how assessing which of the four styles of communication someone prefers can help you better connect with them, why you should approach every interaction knowing your pretext, and the keys for building rapport. And we end our conversation with tips on the Art of elicitation, which is how to get information from someone without directly asking for it.
00:00:30.000He's the author of Human Hacking, Win Friends, Influence People, and Leave Them Better Off for Having Met You.
00:00:45.260In this book, he takes the social engineering principles con men and malicious social hackers use to breach security systems and steal data
00:00:51.060and shows the average person how to use them for positive ends in their personal and professional relationships.
00:00:55.920Today on the show, Chris shares how assessing which of the four styles of communication someone prefers can help you better connect with them,
00:01:01.600why you should approach every interaction knowing your pretext, the keys for building rapport, and the difference between manipulation and influence.
00:01:08.140And we end our conversation with tips on the art of elicitation, which is how to get information from someone without directly asking for it.
00:01:14.580After the show's over, check out our show notes at aom.is slash human hacking.
00:01:25.920All right, Chris Hadnagy, welcome to the show.
00:01:35.000Now, I think when, I think if you grew up in the 90s, like I did, you have this sort of archetypical idea of what a hacker looks like, what they do.
00:01:41.880So usually they're in a dark room, furiously tapping at a keyboard in front of a monitor with a black screen,
00:01:47.680with a green fonted code cascading down, maybe listening to the prodigy, but that's not what you do.
00:01:55.720You do, there's some computer hacking involved, but you primarily hack humans.