Password Cracking : What is Social Engineering | Hacking

This is one of the oldest techniques of hacking when a hacker takes advantage of trusting human beings to get information from them .

Social Engineering Social engineering is when a hacker takes advantage of trusting human beings to get information from them ( like in the movie Hackers 1 if anyone has seen it. When the hero tries to take over a television network).

For example, if the Hacker was trying to get the password for a co-workers computer, he (Even though I use “he”, hackers are of both genders, and I just chose to use “he” in these examples.) could call the co-worker pretending to be from the IT department. The conversation could be something like:

Bob– “Hello Suzy. My name is Bob and I’m from the IT department. We are currently attempting to install a new security update on your computer, but we can’t seem to connect to the user database and extract your user information. Would you mind helping me out and letting me know your password before my boss starts breathing down my neck? It’s one of those days, ya’ know?”
Suzy would probably feel bad for Bob and let him know her password without any hesitation. BAM! She got social engineered. Now the hacker can do whatever he pleases with her account.

Shoulder surfing – Shoulder surfing is exactly what it sounds like. The Hacker would simply attempt to look over your shoulder as you type in your password. The hacker may also watch weather you glance around your desk, looking for a written reminder or the written password itself.
Guessing – If you use a weak password, a Hacker could simple guess it by using the information he knows about you. Some examples of this are: date of birth, phone number, favorite pet, and other simple things like these.
Now that we have the simple low-tech password cracking techniques out of the way, let’s explore some high-tech techniques. Some of the programs I will use in my examples may be blocked by your anti-virus programs when you attempt to run them. Make sure you disable your anti-virus program when you decide to download and explore them.

Now share this information and enjoy Learning Ethical Hacking.

And make sure you subscribe to Learn Hacking. :)

People who read this also read:

Leave a Reply

Your email address will not be published. Required fields are marked *