Write at HWS !!!

Guest Posting

Saturday, May 14, 2011

Chapter 4 : Social Engineering



SOCIAL ENGINEERING

Social enginering is a very small chapter,it is nt only related 2 internet arena bt it is also related 2 ur social nd general life.u do flirt vd a girl dt is social engineering.saying lies 2 some1 4 making ur own work succeed is also social engineering.social engineering is nothing else but 2 do some crooking vd some1 4 making ur own work completed.suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing.
let me tell u d first story of hacking.
it held thru social engineering.
in starting wen telephone ws new in d world then d first hacker of d world,just looked at d working method of telephonic service,he found dt wen we call some1 then our reqst goes 2 telephone office then there it originates a specific freequency then it transfer 2 d person 2 whom we r calling.he just made a tofee nd put a small whistle in dt packet of tofee vd saying it is a gift vd tofee.
ppl nd der children started whistling dt whistle,wenever any1 used dt wistle, it produced d same freequency as d telephone server freequncy nd this thing made dt hacker's calls free around d world.

just look at d whole incident,he just thought nd used a small whistle.
it means social engineering is very much imp.,if u r doing something big then vdout taking d help of social enginering u cann't make ur desired work.
suppose dt der is some1 ur freind nd u want 2 hack his orkut ,then vdout trying 2 hack his password simpally click on forgot password,a general person generally put very comman question here vch is very easy 2 guess if u r his freind,social engineering is a very imp. thing,bcoz he is ur freind den in forgot password

STANDARD DEFINITION OF SOCIAL ENGINEERING

[1]social engineering is d human side of breaking in to a corporate network
companies3 d authentication processes,firewall,virtual private networks nd network monitoring softwares are still wide open 2 attackssocial engineering is d hardest form of attack to defend against bcoz it can't be defend vd hardware or software alone.
sometimes wen u open a website then u see der something written like"congrats' u r d 1lakhth visitor click here 2 claim"
on dese places everyday thousands of ppl give der credit cards information easily,
der r 2 types of social engineering
[first]HUMAN BASED SOCIAL ENGINEERING
IT IS CATEGORIZED IN 2 DESE PARTS
-->impersonation
--->posing as imp. user
--->3rd person approcah
--->technical support

COMPUTER BASED SOCIAL ENGINEERING

these r classified in dese
-->mail/im attachments
-->pop up windows
--->sweepstakes
--->spam mail
dis chapter is over now.
wen u vl do something big in ur future then while planning u vl understand d imporataince of social enginnering.
mind it,4 tracing some1 wen u send som1 a e mail or wen u say him 2 send a file or accept a file 4m him then these things r also social egineering.
we wiill be using this social engineering while sending some1 trojan/keylogger nd 4 many more things.these things vl come in dis course in future.

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.



If you enjoyed this post and wish to be informed whenever a new post is published, then make sure you subscribe to our regular Email Updates!

6 comments:

Pop up windows are just scripts ..... mostly people use pop up for the adds to earn revenue .... but i wont prefer poop ups as they are very annoying for the readers and if you want the visitor to come back then dont use pop ups

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

500+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers