: Table oF Contents :
- [0XFF00000] Preface
- [0XFFF0000] How to get it?
- Social Engineering
- KeyLogger
- Web Spoofing
- Menghadang Email
- Password Cracking
- Session Hijacking
- Menjadi Proxy Server
- Utilizing User Negligence In Using Browser Features
- Googling
- [0XFFFF000]cover
- [0XFFFFF00] Referensi
- [0XFFFFFFF] Attachment [Revenge For The Admin - Social Engineering]
Social Engineering is the name of an information-gathering techniques by exploiting loopholes victim psychology. Or may be also described as "fraud" Social Engineering requires patience and prudence so that the unsuspecting victims. We are required to be creative and able to think like a victim.
Social Engineering is the art of "forcing" people to do things according to your expectations or desires. Of course the "coercion" that do not openly or outside the normal behavior of the victim usual.
[2]. Keylogger
Keylogger is a software that can record user activities. The results of the tape used to be stored in the form of text or images. Keylogger works by pounding the keyboard user. This application is able to recognize forms such as sensitive as a password form.
There are safe ways to avoid keyloger:
Use passwords with special characters such as! @ # $% ^ & * () {} []. Most keyloger will ignore this character so that the offender (keyloger installer) will not get the actual password.
Prepare passwords from home, store it in the form of text. When you wish to enter a password, copy-paste tingal ajah. Keyloger will read your password by pounding the keyboard. However, this method is rather risky. Why? because when you make a copy, your data will be stored in the clipboard. Currently found many free software that can display the data in the clipboard.
[3]. web Spoofing
Still remember the case of theft of customer account number BCA? Yes, that's one obvious example of Web spoofing. The essence of this technique is to utilize a user error when typing a web address in the address bar. Basically, Web Spoofing is an attempt to trick the victim into thinking he is accessing a particular site, but it's not.
[4]. Facing Email
Facing email? Yes, and very easy to do this. One way is to use a utility mailsnarf contained in dsniff. How it works is by blocking Mailsnarf data packets through the Internet and put them together into a complete email.
[5]. Password Cracking
"Hacking while sleeping." That phrase commonly used by people who do password cracking. Why? Because in general dibuthkan long time to perform password cracking. Can take hours, even days and - today! It all depends on the target, whether the target using a common password, password length unusual character, or a combination of passwords with special characters.
No comments:
Post a Comment