Social Engineering

Mar 7, 2014 02:41 AM

Currently I have read and practiced all the "How to" section excluding the "everything else" which I promise i will go through including the practices. I am almost half way through the old forums threads (meaning pages 1 through 5) including all the links in those sections. Guys (meaning noobs) a huge gold mine of information (hint hint)!!!! I will be exploring "Hack this site" after I finish this site.

I am not attempting to brag on the above, I am just attempting to demonstrate that I have done my DD (Due Diligence, in hacking terms "recon" before posing this question.

It appears to me that IT and Law Enforcement are gaining greater skills at tracking a hack, As such the more that we can remove ourselves and incorporate Social Engineering in the equation, meaning the less Data , well we will call them enemy, will have to work with. Again I am not saying they are the enemy but in the case of this scenario and playing the part of a hacker they would be.

I have a way to Target a group, located in a specified demographic area which will gain me the greatest reward for a client side access to a business system. All threw social engineering, which means no email to trace. I see and really like the client side attack against a server and think this might be the way of the future for hackers. Only because there are still so many vulnerability in the client side. Attack from within :). I am still a noob but what do you all think

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!