⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 social.html

📁 黑客培训教程
💻 HTML
📖 第 1 页 / 共 2 页
字号:
<html>

<head>

<title>Social Engineering</title>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">

</head>



<body bgcolor="#000000" text="#FF9900">

<font color="#000000" face="Verdana"> 

<PRE>           

<font color="#FF9900">



               :::::::::   ::::::::  :::::::::  :::::::::: 

               :+:    :+: :+:    :+: :+:    :+: :+:        

               +:+    +:+ +:+        +:+    +:+ +:+        

               +#++:++#+  +#++:++#++ +#++:++#:  :#::+::#   

               +#+    +#+        +#+ +#+    +#+ +#+        

               #+#    #+# #+#    #+# #+#    #+# #+#        

               #########   ########  ###    ### ###  

       

                           

                        <a href="http://blacksun.box.sk">http://blacksun.box.sk</a>

                     ____________________________

 ___________________I           Topic:           I_____________________

\                   I                            I                    /

 \     HTML,        I     Social Engineering     I   Author:         /

 >     Forbze       I                            I                  < 

 /                  I____________________________I   Forbze          \

/________________________>                    <_______________________\



</font>

</PRE>

</font> 

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1"><b>Before I start 

  this tutorial I would like to say something, This topic is a very talked about 

  topic, and I have tried my best to include all that I can, If you cant think 

  of anything better than to flame me for writing this then please don't bother, 

  if you think you can do better, why dont you write a new tutorial on this and 

  we'll gladly upload it.</b></font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Welcome 

  to my tutorial. In this text I will try to explain some of the techniques used 

  while trying to social engineer somebody. This will apply to computer chat, 

  phone conversation, and also just day to day life.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">So 

  what is social engineering?<br>

  Basically, social engineering is the art and science of getting somebody to 

  comply with your wishes. It is not a form of mind control, it will not allow 

  you to get people to perform tasks wildly outside their normal behaviour and 

  it is far from foolproof.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">It 

  also involves a lot more than simply quick thinking and a few selective accents. 

  Social engineering can involve a lot of groundwork. Like normal hacking, Social 

  engineering needs prior preparation, and the majority of the work goes into 

  this, rather than the actual attempt it self.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Social 

  engineering concentrates on the weakest link of the computer security chain, 

  humans. It is often said that the only secure computer is an unplugged one, 

  even this comment is untrue. It is possible that you could talk somebody into 

  plugging it in and switching it on.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900"><br>

  It is also important to note that the human link in the security chain, is the 

  most important one. There is not one computer system in the world that don't 

  exist with out human interaction, and unlike a normal exploit, this vulnerability 

  is universal, independent of platform, software, network or hardware.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Anybody 

  with access to the system physically or electronically is a possible threat. 

  This means that even people not normally included in a security policy could 

  be involved.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">It 

  is impossible to obscure the fact that humans use the system or that they can 

  influence it, because as I stated before, there isn't a computer system in the 

  world that does not use human interaction as a part of it.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Almost 

  every human has the skills to attempt social engineering, the only difference 

  is the amount of skill used when making use of these tools.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Some 

  of the tools are going to be explained below here, and we make note that these 

  are not foolproof skills, and that common sense is the most important tool that 

  you will ever have.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">The 

  first &quot;skill&quot; and most obvious is simply a direct request, where the 

  individual is asked to complete your task directly. Although least likely to 

  succeed, this is the easiest and most straightforward method. The individual 

  knows exactly what you want them to do.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">The 

  second is to create a fake situation, which the individual is simply a part 

  of. With more factors than the individual concerned it is more likely that you 

  will succeed, because you create reasons for compliance other than simply personal 

  ones. This involves far more work for the person making the attempt at persuasion, 

  and most certainly involves gaining extensive knowledge of the 'target'. This 

  also does not mean that the whole social engineering operation needs to be all 

  lies, the best operation will be one where the facts are more truthful than 

  lies.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">One 

  of the essential tools used for social engineering is a good memory for gathered 

  facts. This is something that hackers and sys-admins excel in, especially in 

  there own field of expertise.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Another 

  thing that you can use against somebody is the notation of conformity. It is 

  possible to make somebody to &quot;conform&quot; with the group, even if they 

  know that the decision is wrong, eg. Have you ever been in an assembly/class 

  and the teacher asks a question, eg. Who here has smoked before? When the majority 

  of the class puts their hand up the odd others that haven't tentivally put their 

  hands up so that they do not get looked down upon by their peers.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">That 

  is just an example of the extent that people will go to just so that they don't 

  loose face with the friends/ work companions.</font></p>

<p><font face="Verdana, Arial, Helvetica, sans-serif" size="1" color="#FF9900">Using 

  situations where the person is more likely to go with the flow is a effective 

  way to social engineer them.</font></p>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -