Danger Social Engineering
Well after a while without posting back with this interesting temita , and is very broad, which is Sunday, March 7, 2010
This attack is as powerful as a 0 day, but look a little to what we do not know what it is and for those who can show a real case.
Social engineering is a technique which is able to trick a person pretending to be: a trusted person of the victim, a person whom you would like to know, an attractive person, a person important to the victim posing as the victim etc etc etc ... in order to enter in their area of \u200b\u200bconfidence and remove confidential information such as passwords, documents, files, etc.
Starting
I think one of the easiest ways to trick a man posing as a mine that good, very good: p. The steps are easy you get photos of a girl in particular, a facebook and email. This is the art of deception so to imagine.! Now we can prepare something like a good trojan (in this example, Poison Ivy) crypter gone through to make it undetectable, the following pictures show the before and after Crypter ..
After
Now as our victim could not winning with his genius began to fall in the histeriqueo own a teenage girl! (It is worth mentioning that the victim was a friend Oh, and he never knew about all the work we had back, obviously after I told him that was me eh.! I almost lose their friendship! NAAA .. ha!). Let the conversation
Finally let the 4 items which, according to Kevin Mitnick
Social engineering is successful the
1. We all want to help. 2. The first movement is always trusted the other. 3. We like to say No. 4. We all like to be praised. Greetings
- The main point of this post is not only report if not alarming and that after this not so sure of having a date with all the AV signatures to date, prevented because the Internet you do not know who it is that is on the other side of the PC:).
- In my view "What is Engineering
Social engineering is a technique which is able to trick a person pretending to be: a trusted person of the victim, a person whom you would like to know, an attractive person, a person important to the victim posing as the victim etc etc etc ... in order to enter in their area of \u200b\u200bconfidence and remove confidential information such as passwords, documents, files, etc.
Starting
I think one of the easiest ways to trick a man posing as a mine that good, very good: p. The steps are easy you get photos of a girl in particular, a facebook and email. This is the art of deception so to imagine.! Now we can prepare something like a good trojan (in this example, Poison Ivy) crypter gone through to make it undetectable, the following pictures show the before and after Crypter ..
- Before
After
now seen as a Trojan as known is not detectable by any AV, PC now to imagine the insurance must be with AV, it is another tool that has to fit the entire security process, but salvation is not secure.
Fijense the degree of danger, not just a matter of seeing the green letters, if not above that we are not having knowledge of these things, and this is just the tip of the iceberg.!
Fijense the degree of danger, not just a matter of seeing the green letters, if not above that we are not having knowledge of these things, and this is just the tip of the iceberg.!
I think the picture says it all, good access to the machine through a Trojan, but the danger that this leads to theft of your accounts, your files, steal as much important PRIVACY PRIVACY talking about what is not ours My girlfriend, wife etc.
do not expect as I said earlier that this paper is a form only to report if not also to alert and bring some knowledge with you, that anyone can happen to us that, among other things ..!
do not expect as I said earlier that this paper is a form only to report if not also to alert and bring some knowledge with you, that anyone can happen to us that, among other things ..!
Finally let the 4 items which, according to Kevin Mitnick
Social engineering is successful the
1. We all want to help. 2. The first movement is always trusted the other. 3. We like to say No. 4. We all like to be praised. Greetings
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment