Back in my day, I would probe by hand. Now you can get commercial software that does the job for you.
From Kevin Mitnick
Some people think technology has the answers.
The perfect PIN is not four digits and not associated with your life, like an old telephone number. It's something easy for you to remember and hard for other people to guess.
I can go into LinkedIn and search for network engineers and come up with a list of great spear-phishing targets because they usually have administrator rights over the network. Then I go onto Twitter or Facebook and trick them into doing something, and I have privileged access.
I did get a huge endorphin rush when I was able to crack a system because it was like a video game.
I think malware is a significant threat because the mitigation, like antivirus software, hasn't evolved to a point to really mitigate the risk to a reasonable degree.
No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC didn't stop using VMS.
Once when I was a fugitive, I was working for a law firm in Denver.
I get hired to hack into computers now and sometimes it's actually easier than it was years ago.
Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
29 perspectives
19 perspectives
18 perspectives
16 perspectives
15 perspectives
3 perspectives
2 perspectives