Главная
Study mode:
on
1
Intro
2
Evil Twin Attack
3
The Evil Twin Attack
4
How this got started
5
How it works
6
Example
7
Information gathering
8
Fake LinkedIn accounts
9
LinkedIn information gathering
10
LinkedIn pictures
11
Linking people together
12
Filling out the profile
13
Social media attacks
14
Documentation
15
Evil Twin
16
Man in the Middle
17
Tools needed
18
Firesheet
19
Firesheep
20
Taking over Facebook
21
Social media tools
22
Marketme
23
Social Media Security
24
Contact Info
Description:
Explore information gathering techniques and social media attacks in this 35-minute conference talk from SkyDogCon 2011. Delve into the Evil Twin Attack, its origins, and mechanics through practical examples. Learn about creating fake LinkedIn accounts for information gathering, including profile creation and connecting individuals. Examine social media attack strategies, focusing on Facebook takeovers using tools like Firesheet and Firesheep. Discover social media tools like MarketMe and gain insights into enhancing social media security. Conclude with a discussion on the importance of documentation and contact information in cybersecurity.

Information Gathering and Social Media Attacks to Gain Access

Add to list