Social Engineering Hacking Man

Jason E. he's a guy with glasses and a warm smile. Of course he is nothing like the hacker stereotype often presented in movies (ie somewhat pale, and anti-social). But Jayson is a hacker and a hacker of people...

social hack

Street ο της εξαπάτησης: He is a social engineer, and specializes in security awareness and the breaches that require presence. He is honest, friendly, always smiling, and besides working in this field, he is also an InfoSec Ranger at Pwnie Express, he is known for his books and lectures all over the world.

Information security professionals generally agree that people are the weakest link in security. Workers must have access to do their job, and so attackers are increasingly targeting them instead of the network to penetrate the system.

A successful social engineer must have a broad set of skills. The most important thing seems to be to be able to understand the depth of human emotion. Reading people's faces, interpreting gestures, especially in a foreign country with an appreciably different culture, is a very difficult task that requires unlimited practice and skills.

Essentially, an experienced social engineer is the closest we have to the expression "mind reader." From the expression of a person and the situation he faces he can create a scenario that gives him the advantage.

As Ernest Hemingway once said: "When people talk, listen completely. Most people never listen. " Well, that's what social engineers do.

The they are the most valuable commodity in the world today, and Jayson knows how to get them. During an interview he gave to HNS, he graphically reported that he managed to breach networks in the US, Malaysia, Jordan, Germany, Jamaica, France and Lebanon.Jayson Street hack

His tools?

"I broke a bank in Beirut, Lebanon, wearing a DEF CON leather jacket. "I do not speak Arabic or French, and honestly, I do not bond well in this city," Jayson recalls.

As you can imagine, that didn't stop him. He ended up with an employee's desk chair that allowed him to plug his Hak5 Rubber Ducky USB into his computer. At the end of the "visit" to the bank, he had the user's bank employee's administrative ID, the code them and a smart card.

"Armed with this information I can find my way to their internal LAN."

Naturally, the bank's managers were shocked by the loose security. They knew that if someone else had this type of access, the funds could be emptied.

“I'm not the best coder or exploit developer. I am not and will never be that kind of guy. But it doesn't have to be, if I have a screwdriver and I can take the hard drive from your server. I don't need to skip it , if I can bypass the receptionist,” he says.jaysonstreet spotthegeek hack

Jayson continues:

"Last year I managed to bypass the entire infrastructure of a high-class hotel on the French Riviera, wearing Ninja Turtles pajamas and walking barefoot."

Confidence is the . During this walk he stumbled upon an unguarded entrance to the employee quarters, and within 30 minutes he was in the corporate office.

In these facilities after office hours the security was non-existent: desks, unlocked computers, drawers open…

"I have never had a problem anywhere, even in government or financial institutions. "In fact, a guard once helped me take the server out of the computer room and put it in my car," he recalls happily.

Instead – social

"I do not try to destroy companies. "I make commitments for social awareness - my job is to educate people so they can understand."

Jayson even seems to be really trying to get caught. In his last "attack" he made suspicious intentional moves to manifest himself. In vain…

"I recently broke into a very secure building in New York across from Ground Zero wearing a t-shirt that said 'Your company's computer guy.'

After the violation he went back to the building and explained to the people involved what had happened and why. It is the point of his work aimed at raising awareness of security issues.

"Despite the outcome of my attacks, I have never met an idiot user," he notes. "But I see uneducated users who do not have the proper training," he says, explaining that safety training should be an essential part of employee training.

His advice?

1. If you feel like something is wrong, listen to the voice that tells you to react.

2. Organizations should have some people they can call in case of doubt, or an email address through which help can be reached. Every employee should know that if he or she sees a suspicious person wandering around, or when he or she receives a suspicious e-mail, he or she may notify someone who will investigate what is happening. "Do not approach the person, do not open the attachment, inform the security", he advises.

This advice may sound simple, but Jayson's adventures around the world prove that even the largest organizations in the world still have not implemented basic security measures and do not have trained employees.

Hacking; People remain the weakest link of security.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).