Seven Deadliest Social Network Attacks by Carl Timm & Richard Perez
Author:Carl Timm & Richard Perez
Language: eng
Format: epub
Publisher: Elsevier Science
Published: 2010-11-15T00:00:00+00:00
Creating the Evil Twin
Now we get to do the fun stuff. In this section, we are going to take a look at what it really takes to create an Evil Twin attack. You may be surprised at how easy it is to get the information we need and the process we go through. Time for a little disclaimer: do not do this at home and we made an Evil Twin of one of the authors of this book. With that out of the way, letâs get started. We will need the following information before we can begin:
⢠The personâs name we want to impersonate.
Thatâs all we need. Now if we want to make it more believable, we will want to have the following information as well:
⢠Birth date
⢠Hometown
⢠Employer
⢠High school
⢠Special groups they may belong to
⢠A profile photo
⢠More photos of the person and their family
⢠City and state they currently live in
You may be thinking that this information is going to be hard to get. Guess what? It isnât. All you need to do is go to Facebook and search for the person. Even if you are not friends of the person, you will have access to all of that information. Why you ask? Because the default privacy setting for it is âEveryoneâ and we learned earlier that means everyone can see it. However, we do have some security-conscious users out there that do change their default settings. If this is the case, you would not be able to see this info. So, how do we get it? Pretty easy â do a search for them on Google or look the user upon another social networking site. More than likely, you will find the information you are looking for.
Now that we have the info, we can begin. There is a process we will need to go through to create the attack. Donât worry though, itâs not very intense. The steps we will need to go through are as follows:
⢠Create a bogus e-mail account.
⢠Create Evil Twin account.
⢠Start inviting friends.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
| Anthropology | Archaeology |
| Philosophy | Politics & Government |
| Social Sciences | Sociology |
| Women's Studies |
Cecilia; Or, Memoirs of an Heiress — Volume 1 by Fanny Burney(32523)
Cecilia; Or, Memoirs of an Heiress — Volume 2 by Fanny Burney(31928)
Cecilia; Or, Memoirs of an Heiress — Volume 3 by Fanny Burney(31912)
The Great Music City by Andrea Baker(31894)
We're Going to Need More Wine by Gabrielle Union(19019)
All the Missing Girls by Megan Miranda(15878)
Pimp by Iceberg Slim(14461)
Bombshells: Glamour Girls of a Lifetime by Sullivan Steve(14036)
For the Love of Europe by Rick Steves(13791)
Talking to Strangers by Malcolm Gladwell(13327)
Norse Mythology by Gaiman Neil(13312)
Fifty Shades Freed by E L James(13214)
Mindhunter: Inside the FBI's Elite Serial Crime Unit by John E. Douglas & Mark Olshaker(9283)
Crazy Rich Asians by Kevin Kwan(9256)
The Lost Art of Listening by Michael P. Nichols(7475)
Enlightenment Now: The Case for Reason, Science, Humanism, and Progress by Steven Pinker(7287)
The Four Agreements by Don Miguel Ruiz(6726)
Bad Blood by John Carreyrou(6597)
Weapons of Math Destruction by Cathy O'Neil(6243)