Jump to content

Analyser_

Members
  • Posts

    99
  • Credits

  • Joined

  • Last visited

    Never
  • Feedback

    0%

Everything posted by Analyser_

  1. You can't find someone's location like that , you will find the Internet provider's one.
  2. I would appreciate if you vote , also you can give me ideas about upcoming shares!
  3. Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a “con game.” For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network’s security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques. Social engineering is a component of many, if not most, types of exploits. Virus writers use social engineering tactics to persuade people to run malware-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, and scareware vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst. Another aspect of social engineering relies on people’s inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone’s shoulder (shoulder surfing), or take advantage of people’s natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people’s awareness of how social engineers operate. For any questions like what is should - surfing leave me a post! Thanks for reading.
  4. I was bored so i decided to write a tutorial about information gathering – doxing. So because many of us spent too much time on facebook so I decided to write a tutorial on how to dox someone using facebook. The Way To Dox Easily : My favorite one is password recovery. “Quick Tips” Before using the password recovery method logout from your facebook Clear your browser data using CCleaner http://www.piriform.com/ccleaner First go : https://en-gb.facebook.com/login/identify?ctx=recover You must be looking something like this Now you have two options either you enter username or a victims profile name.So username can be found (usually) by looking at the profile url or it can be found by looking at facebook mail (f.e. examples 1 username was giwrgos.tsamphs) If that failed You can simply enter the victims name in the box that says “Your Name” (in my case Andrija Pavlovic) and in the box A friend’s name enter your facebook profile name. So if all went all right you will be seeing something like this So “andrija.pavlovic.503″ is the username. Keep in mind that username can many time help you find more info. Press this is my account button. You will be seeing something like this And you can now see some hidden info. We Are Intrested in “a**************c@l***.com” So we know its a @live.com mail (common logic) and we also have an “a” in the beggining and a “c” in the end of the mail. His name ij andrija pavlovic so i tried andrijapavlovic@live.com Guess what its wrong! The length of the 1st mail is 25 characters long (“a**************c@l***.com”) and the length of the seccond one is 24 characters long (“andrijapavlovic@live.com”) So I inserted a dot (“.”) between his name and surname and now his mail looks like this “andrija.pavlovic@live.com” 25 characters long like the 1st one. There is one way to find if this is his real mail and this is facebook search “Quick Tip” Facebook searches with mails will display result’s back to you only if a user with the mail you entered exists So I typed ”andrija.pavlovic@live.com” in the search bar and… Yep that’s his email address. Another one PWNED. Well that’s the end of the tutorial. This is my first toturial rate me as easily as you can , more tutorials comming soon.
  5. Hello guys nice to be in your forum :)
×
×
  • Create New...