• Simple techniques and posture against social engineering attacks

    The Internet is a maze of interactions among people, organizations and computers. The simplest way to attack is to find the weak link in the relationship. Usually, people are the weakest link among the three, so it has become the simplest way for an attack to enter any organization's computer network. Modern hackers have turned the attack target from the organization's system to the human operating system. Attacking individuals requires a different set of tools and skills to transform from brute force to strategy, while social engineering takes advantage of human weaknesses, such as human instincts read the whole passage
    Author: qxz_xp | Published: May 7, 2015 | Classification: Hacker technology , Hacker attack and defense | 2 comments
  • Part III: Countercheck Technology of Social Engineering

    Part III: Social Engineering - Backcheck Technology What is counter checking technology? That is anti investigation technology. In hacker attacks, the most important part is not to successfully invade the host, but to remove traces, so that managers do not find the intrusion and forged data. Similarly, social engineering also has such a concept. So, what traces should we remove to avoid the discovery of cyber censorship (hereinafter referred to as cyber police)? In this part, we will look at the problem from the perspective of cyber police to see how they can find clues about social engineers. Or a joke: He read the whole passage
    Author: qxz_xp | Published: November 13, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Part II: Application of Psychology in Social Engineering

    Part II: Application of Social Engineering Psychology From what has been said above, we know that human weakness is an important part of social engineering. In fact, it is an application of psychology and a branch of social engineering. This paper analyzes three typical attack cases in The Art of Deception written by Kevin Mitnick, a social engineer, from a psychological perspective, It will reveal the application of psychology in social engineering. In order to save space, I do not intend to copy the case, so please refer to the document "The Art of Deception" attached to the CD read the whole passage
    Author: qxz_xp | Published: November 1, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Some simple social engineering points

    1. The definition of social engineering is not that you simply search the victim's information on the Internet, which is not even a narrow sense of social engineering. The activities you want to carry out are not limited to narrow social engineering. You need to carry out some in-depth interactive behaviors with victims or information owners. ① In this process, we should make full use of the known information, especially the information extended in search engines, to increase trust. For example, Google Maps can be used to explore the surrounding environment, or to understand the victim's interpersonal relationship and online activity. ... read the whole passage
    Author: qxz_xp | Published: October 26, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Part I: Information snooping in social engineering

    Part I: Social Engineering - Information Spying 1、 Use the information around you Try to make use of the existing information, which will be able to deal with emergencies. Such information refers to rules, regulations, methods and agreements. Rules refer to the rules of an industry. We can think of them as trade rules or internal agreements. For example, stall A, in order to rob stall B of its business, is wrong to deliberately lower the price of stall B and break the unfair business law. So we should try to understand such information from all walks of life, such as read the whole passage
    Author: qxz_xp | Published: October 22, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Some Simple Skills of Social Engineering

    Social engineering has become one of the most popular attacks at present, and it always appears in some large data leakage cases. For example, RSA break encountered targeted phishing and loading vulnerable Excel files in 2011. Therefore, for enterprises capable of simulating real attacks, social worker penetration testing should become a mandatory strategy for each penetration testing toolkit. Social workers' behavior is very dependent on psychology, and there are many very suspicious lures that can persuade people to engage in certain operations. For example, Robert Cialdini read the whole passage
    Author: qxz_xp | Published: May 20, 2014 | Classification: Social worker related , Hacker attack and defense | 1 comment
  • Social worker data analyzed by Jiyou (transfer)

    First of all, I am not a social worker. I just want to talk about my personal opinion. I can only provide you with a few ideas. Welcome to add. Here I call our social worker A. First Search his QQ number online first, and you will generally get a series of BBS such as Baidu Post Bar and Baidu Know. The most useful one is Baidu Post Bar, which contains a lot of information, such as school, class, age, birthday, trumpet, etc. Among them, the trumpet is the most valuable. Ordinary people dare not send their privacy to the large size. Example: One day when surfing the Internet read the whole passage
    Author: qxz_xp | Published: February 13, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • QQ complained about that

    0 × 00 background This is a piece of bullshit, or a summary of grievance loopholes. The following cases are all my own experiments. There is nothing false, (maybe some places will exaggerate~) We should start with the "Black Cloud White Hat Stolen Event", because the white hat "Ghost Lamb" was complained about by QQ for unknown reasons, and the security protection measures of Black Cloud Network have not been improved. Let the number theft have an opportunity. and. I hope that Uyun can add a verification code to the place where the password is found, otherwise it will be like http://zone.wooyu... read the whole passage
    Author: qxz_xp | Published: January 16, 2014 | Classification: Social worker related , Hacker attack and defense | No comment