Tag Archives: social engineering

SMS Password Reset Phishing Used to Compromise Emails


Social engineering is a simple and effective way to compromise user credentials. people are vulnerable and sometime have no ability to prevent some simple attacks. This is related to human capacity so for example memory problem where user have no

Scammers promise to pay you back as soon as they get home

Skype and any instant messaging system is trusted by user, this makes any account hacked can be used by attacker to make scams and have some income. New case have been posted on Kaspersky blog where attacker compromised one contact

Linkedin Klepto – Social Engineering Tool for LinkedIn

During a penetration testing it is important to conduct a company profiling, search online for information available on social networks like Facebook, Twitter, Google+, and LinkedIn that will help to find the system used by the company. On internet there

Review: uCertify CEH v7 your Quick path to be certified

Today we hear a lot about new generation of IT Security certifications, you go to Linkedin and you find all people adding their certifications on their profiles and this can be a good way to promote their appearance on different

FBPwn – Facebook social engineering framework


Today we are sharing all our sensitive information on social networks websites such as Facebook, twitter and more. I have just used a very nice tool that you can use on your lab as a PoC about how it will

theHarvester Retrieve Desired Information Online

theHarvester is a Computer-based social engineering tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key servers. This tools is intended to help Penetration testers in the early stages of the

New Update: The Social-Engineer Toolkit v1.3.5

Social engineering has enjoying an increasingly effective and prominent role in effective online attacks. The term itself is a big one, encompassing targeted surveillance and information-gathering techniques that early hacking stars such as Kevin Mitnick mastered (and went on to