[ Pobierz całość w formacie PDF ]
what fills in the blanks. This person may sound romantic, funny
and down to earth. There is a trust value that is built up and
depending on how long you ve been on the Internet , this initial
base of trust is formed very quickly.
61
61
61
61
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
At this point after the ice has been broken so to speak the
hacker may ask if you wish to see his/her picture. This is the
turning point of your conversation. Most people would reply sure
and then receive the picture from the hacker.
This is where the situation gets interesting. The hacker in
question has the window of opportunity to either attempt to send
you a real picture or a Trojan.
If the hacker sends you a legitimate picture, then that helps to
build trust between them and you. If they go for the strike right
of the bat then they risk exposing themselves. In either case
their goal has been accomplished which is to get you to accept
the file from them.
By gaining your trust and getting you as a user to drop your
guard you ve compromised your systems security.
Given it takes a certain level of finesse and grace to accomplish
this type of attack. It requires the hacker to be socially adept,
quick witted and very confident. Not usually the characteristics of
the stereotypical hacker definition.
To protect yourself on this level you must become aware of the
game. The truth is that this is all a game to hackers.
Hackers treasure their anonymity to win against them the trick is
to reverse the situation. Get them to expose themselves and
their intent.
Let s take a real life situation that you may encounter.
For simplicity sake we ll say you have encountered a potential
hacker on a chat line. The person seems charming, funny even
normal by every sense of the word. The conversation becomes a
little personal at some point and while not giving him your life
story you share some fairly confidential information with this
person.
The conversation heats up and turns to the point of a possible
picture trade. The potential hacker wishes to trade pictures
with you. You tell him/her you don t have a picture and their
62
62
62
62
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
remark is something to the effect of well would you like to see
my picture anyway? So you agree for him/her to send you their
picture.
Upon receiving their picture you notice the file is called:
" John.exe or susan.exe
(Recalling what you ve read in this manual you know that their
picture should never be in this format. So you don t double click
on it)
This is where your awareness and intuition kicks in. You have
two options.
A) Confront the potential hacker about the file type.
B) Play up to the game and see if you can catch this person
by making them expose themselves.
If you confront the person perhaps you ll receive explanations like
it s a self extracting picture. At which point you can tell them
they are lying. You will probably scare off the potential hacker
by being that direct with them. They will more than likely log
offline very quickly. If you play up to the game you have the
chance to maybe catch them, or at least find out who they are.
63
63
63
63
Like me: https://www.facebook.com/pages/Download-from-harks/124201754417002
IRC EXAMPLE
IRC is a hunting ground for hackers. It doesn t take much skill
or much know-how, to infect an individuals computer on IRC.
Some of the most common tactics is to assume the identity of a
girl and going to channels where pictures are commonly
exchanged. Channels such as adults 30+ or adult-chat.
Hackers know that hacking is 60% psychological warfare 40%
computer knowledge.
One of the most popular methods of sending a person a Trojan
on IRC is to automatically send you the file when you join a
channel. The reason goes as such that some people have a
feature turned on in their IRC programs that automatically
accepts incoming file transfers.
(Consult your IRC program documentation)
When you join the channel, you automatically accept the file. If
you are aware of the file you might see it is called something like
tiffany.jpg.exe. Out of sheer curiosity some people will open
the file to see what it is, especially those who are not aware of
[ Pobierz całość w formacie PDF ]