[Nulled] » Page 275

💬 true story... The enemy is inside: how I got caught on insider redtiming.

• I had all the advantages. I've already been online. I was above suspicion. But they discovered my hacking, kicked me out of the network... and tracked me down physically.

💬 true story... Jonathan James. The story of a hacker who hacked the Pentagon and NASA at the age of 15.

The most difficult thing is not getting into the system, but learning and gaining knowledge so that you can then understand what can be done with it.

💬 true story... Social Engineering.

• Today we are talking about social engineering, namely the hacking of the American prison system with the help of #SI. Kevin Mitnick argued that no technology in the world can resist a social engineer, since people are easy to manipulate, and even in the most secure systems, it is people who can be the weak link.

💬 true story. "Theft" with burglary: the pentest of a financial organization.

• In this post, the author will tell you how broken logic, self-written services and graphical passwords can lead to the seizure of the company's network infrastructure, complete loss of money and user data.

💬 true story from Group IB. Social Engineering.

• Today I have prepared for you another and interesting story from Group IB, accepted reading:

💬 true story... Social Engineering.

The question is not "Will you be hacked or not?", but "How quickly can you find out that you have already been hacked?!"

💬 true story from Group IB. Social Engineering.

The main component of phishing is that this method of attack allows us to bypass the most advanced defense systems, influencing people and their emotions so that they perform actions necessary for the attacker.
Today, we will get acquainted with the story from Group IB, about Social Engineering, greed and sudden help:

💬 true story... Social Engineering.

• Technical security measures practically do not reduce the risks from attacks by Social Engineering methods. "There is no device that prohibits people from being idiots." Two years before the Snowden incident, the US Department of Homeland Security (DHS) checked people who are responsible for preventing threats nationwide, and they behaved like small children.

💬 true story. Cards. Money. Double VPN.

This small, sometimes sad, and sometimes funny story, about how you can lose everything on an even level, if you completely forget about your conscience.


Social Engineering ​💬 true story...

🖖🏻 Greetings to you user_name.

• Today I want to share with you an interesting story from a #Red_Team specialist from IBM. The text is quite long, but interesting. Let's go..

💬 true story... Attack of the century. How to cheat Google and Facebook for hundreds of millions of dollars with the help of SI.

• As the name already implies, today's story is dedicated to Facebook and Google, from whom millions of dollars were stolen with the help of social engineering.

📓 Book: Network Security.

• Today's book contains step-by-step instructions for installing and using firewalls, information about the security of wireless connections, biometric authentication methods and other modern methods of protection. 

🧠 S.E. Note. Classical social engineering.

• To carry out a successful attack, attackers need three components: time, perseverance and patience. Often, attacks using social engineering are carried out gradually and methodically — not only data about the right people are collected, but also so-called "social signals". This is done in order to gain trust and circumvent the target. For example, an attacker can convince the victim with whom the dialogue is being built that they are colleagues.

Social Engineering. Cheating bloggers and hijacking channels.

• Yesterday, a video message was published from a well-known blogger (AICHI Beard), who covers the topic of programming and publishes interesting interviews with developers. The fact is that with the help of social engineering methods, the author was forced to enter data on a phishing resource, after which the account was hacked, and the Telegram * channel was hijacked. After the successful hacking, various binary options, which are a scam, began to be published in the TG channel.

🗞 The Privacy, Security, & OSINT Magazine.

• This month, the fifth issue of the magazine "UNREDACTED Magazine", authored by Michael Bazzell, appeared online.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    October 2024    »
MonTueWedThuFriSatSun
 123456
78910111213
14151617181920
21222324252627
28293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +4 Total articles 6553
  • +16 Comments 4018
  • +30 Users : 5636