Let me know if you need more options

People are the biggest weakness in the entire process of network security. Attacks against people often have unexpected effects. If you want to exploit people’s weaknesses to attack, then it is very important to collect and understand the target’s information. This article records some commonly used technologies for collecting identity information on people. These technologies are often used for tracing evidence and social engineering attacks.Let me know if you need more options

0x00 Identity Information Collection in Social Engineering Analysis

There are many dimensions of information in social work an Chinese Overseas Asia Number Data  alysis about people that deserve attention. But no matter what, identity information social work often starts with some of the most basic information about people. The process of collecting identity information is to use limited information to associate other information as much as possible.

Here, information about people is simply divided into two categories.

The first category is basic information. Such as name , nickname , mobile phone number , email address , various certificates , and social accounts . This type of information can help determine a person’s identity during tracing. It is information that people inevitably use in the process of socializing, used to indicate their identity in society, and is a business card for living in society.

The second category is other information. Such as place of residence , hobbies , family status , marital status , and occupation . This type of information can help us better understand a person’s living habits and living conditions, and represents the characteristics of a person. It is very useful when generating customized social engineering dictionaries.

The following introduces the commonly used information collection methods.

 

Chinese Overseas Asia Number Data

1 Search engine keyword search

The dumbest but often most effective way is to se

arch by keywords. However, to achieve be tter results, it depends on many conditions:

  1. Keywords cannot be too popular. You can choose a combination of multiple keywords related to your target.
  2. The target must be active on the Internet;
  3. Try to use foreign search engines such as Google and DuckDuckGo. They block fewer web pages and results.

2 Registered website query

There is a type of website on the Internet that aims to colle Afghanistan Phone Number List ct and store various user activity information to build user portraits, or to collect databases from previous information leaks. I will not discuss the motivations of such websites or whether they are real and effective, but to a certain extent, they also provide others with a way to obtain more information about the target. By querying the pan-social engineering database, you can obtain the social networking sites that the target has registered on, and even the old passwords. Let me know if you need more options  

One common practice used by

One common practice used by

world of software development, handling configuration variables is crucial for building scalable, reliable, and secure applications.   developers is the use of env […]

Leave a comment

Your email address will not be published. Required fields are marked *