aliyawar
No longer a newbie, moving up!
- Joined
- Nov 15, 2012
- Messages
- 349
- Reaction score
- 65
- Location
- India
- Can others edit my Photos
- Photos OK to edit
- Thread Starter 🔹
- #91
Here's an anti-phishing tip from a Network/Systems Administrator point-of-view:
Network and systems administrators never need your username or password and will never ask for it. We can change all of that on our own. Someone who asks you for this information obviously cannot change it and thus is not in a position to have it. Don't give it to them. It would seem like common sense but most of the successful hacks were from simple social engineering techniques such as these.
Example at some huge corporate office. Potential hacker finds number of vice president of the organization: "Hello, this is Dave down in the dungeon, the server room if you will. Is this Mr. Penske?" "Yes, it is. How can I help you Dave?" "Well sir, I certainly don't mean to bother you but we had a small mishap, nothing major but one of the account servers went down just a couple minutes ago. I tried to get her back up and running but she's a goner I'm afraid." "That doesn't sound good, how can I help?" "Its not as bad as it sounds, no major data was lost but unfortunately a few account logins are lost. I have another account server sitting here ready to get to work but I need your old username and password so I can get your account back up and running as soon as possible to minimize downtime." "Should we just change the password, make a new one or something?" "No need to do that sir. I know that you have a lot on your mind and we really appreciate all you do for us. I figure we can just keep the same username and password so you have one less thing to stress over. So having said that, if you can give me that, I'll get right to work on the account and let you get back to your day."
I would hope this wouldn't work but in a larger place, it's easy for the higher-ups to lose track of all the people that work for them. Hence, if you find a person who doesn't take the time to think about these potential situations occurring and goes along with what you ask, you've found yourself a little way further into the target system.
*it worked a lot when I was younger. In 2001, I would look for corporate numbers, names of higher-ups and a little history of the target organization. I would then call them in the early afternoon, right after lunch, when most people are susceptible to engineering. It didn't work all of the time but at least ninety-percent. I made it sound like I knew what I was talking about, wanted to genuinely help resolve this made up issue and knew the organization as if though I truly worked there for a while. People were very eager to help me "help" them. Once I got the username/password, I would use Ghostmail to send the real administrators of the organization an email stating what I had done and what I was able to get. This was in an attempt to make sure policies and procedures into network security were looked into and strengthened. Perhaps that wasn't the best way to go about things but I was young. Now I could care less for lazy administrators. Let them get hacked for all I care. I'll just make sure I am safe out there.
Yeah...you are right...that's exactly how Mitnick got to do it sans any great programming skills.. Have you read ghost in the wires?? I've always thought he is an overhyped fellow...we have a douche like him in India too..his name is Ankit fadia..A friend of mine from Indishell once hacked his own website... it gave me a good laugh..you can google the Idiot..