Analysis of 10 engineering hacking techniques that surprise you

Source: Internet
Author: User

Analysis of 10 engineering hacking techniques that surprise you

Kevin, the world's first hacker? In the art of deception, Mitnick mentioned that human factors are the weakness of security. Many companies invest heavily in information security, but the cause of data leakage lies in the people themselves. As you may not imagine, it may be the most troublesome Method for hackers to obtain data through remote penetration cracking. A hacking technique that does not require computer networks and focuses more on human weakness is emerging. This is a social engineering attack.

Social engineering is a non-technical means to obtain information through interpersonal communication. Unfortunately, this approach is effective and efficient. In fact, social engineering is one of the greatest threats to enterprise security. The following lists the ten social engineering tricks that will make you feel chilly after reading them.

1. Acquaintances speak well. This is the most widely used method among social engineering attackers. the principle is roughly like this. hackers first become acquaintances you often access through various means, and then gradually become recognized by other colleagues in your company. They often visit your company and ultimately win trust, you can get a lot of permissions in your company to implement the plan, such as accessing areas that should not be allowed or entering the office after work.

2. forge similar information backgrounds when you contact people who seem familiar with the Organization and have some undisclosed information, you can easily treat them as your own. So when a stranger enters the office in the name of a company or employee, it is easy to get a permit. However, in this society, it is too easy to obtain personal information from various social networks. So next time, a stranger claims to be very familiar with a colleague, so that the employee can receive the reception in the specified area.

3. disguise as a new person. If you want to obtain company information with certainty, hackers can apply for a job to become their real people. This is one of the reasons that every new employee must undergo a thorough review. Of course, there are still some hackers who can go across the sea, so the environment for new employees should be limited. This sounds harsh, but it must be proved by new employees for a while, they are trustworthy for valuable company core assets. Even so, good hackers are familiar with this workflow and can launch attacks only after they fully gain trust.

4. Taking advantage of interview opportunities, a lot of important information may also be disclosed during the interview. Hackers proficient in social engineering will take advantage of this and do not have to bother with the next day, you can get important information through the interview. The company needs to ensure that the information provided during the interview is not confidential and should be kept as simple as possible.

5. the wicked do not have taboos. This may sound contrary to intuition, but it does work. ordinary people tend to go away from angry and evil people. When you see someone talking with a cell phone or cursing with anger, you usually avoid them. as a matter of fact, most people choose this way, giving them a channel to the company's internal and data. don't be fooled. once you see similar things happen, it is good to notify the security guard.

6. He understands me like an experienced social engineering hacker in my stomach who understands and uses others' body languages. He may have a concert with you at the same time. He appreciates a certain segment just like you. When talking with you, he can always give proper feedback. You feel like you have met a friend, you and him begin to establish a two-way open bond, and slowly he begins to influence you, And then manipulate your company's confidential information. It sounds like a spy story, but in fact it often happens.

7. At present, the beauty program has always been mentioned by the ancestor, but most people cannot resist it. Just like the fantastic plot of movies and TV series, suddenly a beautiful girl (or handsome guy) asks you out one day. During this time, you two will see the scene and have a great laugh. What's more, after that, she will come after appointments until she can reveal company secrets from your mouth as if she were discussing dinner. I am not trying to beat your romantic feelings, but it won't fall into the sky. Please be cautious with those who ask questions you shouldn't ask.

8: Foreign monks will read that this kind of thing is already happening. A social engineering attacker often acts as a professional consultant and obtains your information while completing the work of the consultant. this is especially true for IT consultants. you must review these consultants and ensure that they are not given any opportunity to disclose their confidentiality. don't trust others simply because someone has the ability to solve your server or network problems doesn't mean they won't use it to create a backend or directly copy your data. so the key is review, review, and review.

9. Kindness is the tomb of the good. This method is simple and so common. When hackers and other employees of the target company opened the door with their own passwords, they followed in the company. the clever way is to carry a heavy box and ask the staff to hold the door for them. good employees usually help them at the door. Then, hackers can start their own tasks.

10. Come to a technical exchange movie Hackers, where Dade (also called ZeroCool) calls a company and instructs a staff member to give him the number of modem devices, the conversation here is his major penetration work, and the unlucky employee will tell him anything he needs. this is a common attack. when all employees who are not aware of the attack encounter well-prepared hackers, they may leak any information they want due to lack of experience in coping with social engineering attacks.

As early as before Internet products were still spreading word of mouth with six contacts, hackers had already mastered this theory for penetration attacks. Today, when individual frauds occur frequently, the chances of enterprises suffering such attacks are exponentially increased.

Have your company been attacked by people using social engineering? What protection measures have you taken for social engineering attacks? I hope this article will help you understand and understand the penetration methods that originally existed in our blind spots and build barriers to avoid being victims.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.