Tag Archives: social engineering

Scammers promise to pay you back as soon as they get home

Skype and any instant messaging system is trusted by user, this makes any account hacked can be used by attacker to make scams and have some income. New case have been posted on Kaspersky blog where attacker compromised one contact

Linkedin Klepto – Social Engineering Tool for LinkedIn

During a penetration testing it is important to conduct a company profiling, search online for information available on social networks like Facebook, Twitter, Google+, and LinkedIn that will help to find the system used by the company. On internet there

Review: uCertify CEH v7 your Quick path to be certified

Today we hear a lot about new generation of IT Security certifications, you go to Linkedin and you find all people adding their certifications on their profiles and this can be a good way to promote their appearance on different

FBPwn – Facebook social engineering framework

facebook-privacy

Today we are sharing all our sensitive information on social networks websites such as Facebook, twitter and more. I have just used a very nice tool that you can use on your lab as a PoC about how it will

theHarvester Retrieve Desired Information Online

theHarvester is a Computer-based social engineering tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key servers. This tools is intended to help Penetration testers in the early stages of the

New Update: The Social-Engineer Toolkit v1.3.5

Social engineering has enjoying an increasingly effective and prominent role in effective online attacks. The term itself is a big one, encompassing targeted surveillance and information-gathering techniques that early hacking stars such as Kevin Mitnick mastered (and went on to

New Release: The Social Engineering Toolkit v1.1

Social engineering has enjoying an increasingly effective and prominent role in effective online attacks. The term itself is a big one, encompassing targeted surveillance and information-gathering techniques that early hacking stars such as Kevin Mitnick mastered (and went on to