HACKING &
CRACKING used to obtain I.D. theft info this
page created 2002 Dec 11
|
VIDEO # 1
notes from the TLC video "Hackers, Outlaws & Angels" |
.
The Black Hats | .
Murphy targeted the giant telephone company AT&T. By using a number of technical and non-technical techniques (such as recovering manuals from dumpsters) , he changed the clocks on the telephone system computers to give everyone free long distance calls. Millions of people saved money and they didn't even know it, till AT&T sent out the next monthly bills. According to Wired Magazine it was the top hack ever. |
Tiger Teams | .
From www.ctrl-c.liu.se/~ingvar/jargon/t.html we see the following explanation "Originally, a team whose purpose is to penetrate security, and thus test security measures. These people are paid professionals who do hacker-type tricks, e.g., leave cardboard signs saying "bomb" in critical defense installations, hand-lettered notes saying "Your codebooks have been stolen" (they usually haven't been) inside safes, etc. After a successful penetration, some high-ranking security type shows up the next morning for a `security review' and finds the sign, note, etc., and all hell breaks loose. Serious successes of tiger teams sometimes lead to early retirement for base commanders and security officers,. |
Black
Hats
Tricks Social
Black Hats
Social
|
.
"Social engineering is hacker jargon for getting needed information (for example, a password) from a person rather than breaking into a system. Psychological subversion is Thunder's term for using social engineering over an extended period of time to maintain a continuing stream of information and help from unsuspecting users." This link below explains at length the variations on social engineering techniques |
Black
Hats
Tricks Social
Black Hats
Social
|
.
"The enticements of pornography, free software and security -- otherwise known as "social engineering" -- that have been common among e-mail-borne computer viruses now have spread to instant messaging (IM) and Internet Relay Chat (IRC), according to CERT, a federally funded security center based at the Software Engineering Institute of Carnegie Mellon University. CERT said it has received reports that "tens of thousands of systems have recently been compromised" using "social engineering attacks" via IRC or instant messaging. The attacks attempt to trick Internet chat users into downloading what purports to be antivirus protection, improved music downloads or pornography but is actually malicious code, the center reported. While use of social engineering among virus writers and hackers is nothing new, the IRC and IM tricks have allowed thousands of computers to be taken over and used in distributed denial-of-service (DDoS) attacks or infected with Trojan horse or backdoor programs, according to CERT." "... another trend in social
engineering with IRC networks involves picking out individuals, spamming
them with unsolicited messages, then offering a bogus spam solution that
is actually malicious code."
|
Social
Engineering an example |
In the 4th week of January 2006, I received the following email from one of my UTM students in MGD415. She said
This company probably didn’t exist, but just used a popular name. Such things like this are scary because you think you’re talking to the right person, but then things get a bit fishy later. Information needs to be confidential and secured. Isn’t this an example of information intelligence? – trying to steal peoples information!" Yes, it is a good example,
you should always be circumspect and suspicious when people ask you to
clarify information they are already supposed to have on file.
|
Info War | .
Chris Roland XForce Internet Intelligence discusses Info War Bob Ayers
|
War
Drive
exposing vulnerabilities in wireless networks |
a variety of
government departments use wireless networks and are vulnerable to hackers
on the outside
"war drive" is slang expression for an electronic fishing expedition looking for vulnerable wireless networds |
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES I TEXTS USED I IMAGES I RANK I DISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I PUBLICATIONS I | |
. |