SERVFORU

Latest Post
Showing posts with label Social engineering. Show all posts
Showing posts with label Social engineering. Show all posts

Turn your Social media in to Paychecks with right Social Media Optimization Strategy

Social media optimization is the process of increasing the awareness of product or service or brand or event by using social media .

Social media includes all the common Twitter,  Facebook , Linkedin , Pinterest , Blogger etc which have large content contributions . To generate the viral publicity we need a unique user generated content base

mostly all business focused on listed in Google's first page results using SEO and keyword researchs to drive traffic in to their web portals. Social media have a faster impact over people than Google . Last month traffic to Blogger was more than 220 million . So its by attracting so of that traffic surely business can achieve more



When even before starting a business people and marketers do create a Facebook Fanpage , twitter handle and Youtube channel , not all business need all these .you can do better making your own online presence which is social media friendly to linking with your products and services

Social Meida is the online version of word of mouth advertising , so by engaging with your social media can make a positive change in the customer base

Being simple the users can communicate with you , being open and honest make you as favourite to your  customers . Merge the current marketing with social media . May be some them are familiar with your existing marketing campaigns link it with social media ,

 Mostly all business have an SEO strategy to make Google's Search Engine ranking priority list . Blogging is the perfect way to optimize the content to Google . Concentrate on making contents for your blog and don't stop there . Cut short the contents or make the headlines for Facebook and twitter updates .use the same for print and email marketing

You can make announcements  via your social media , and other great way of using social media is by offers .. give massive offer announcements which will surely increase number of the customers


If need a perfect SMO strategy contact  








 

Social engineering ; A career


social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.

When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test and improve organizations' security practices.
Being able to determine which type of job you are seeking is crucial. In-house and contract employees have different challenges.. Recent contract wins and any enforcement action should be noted, as well as awards and recognition for outstanding work and employee satisfaction. Purchases and sales of smaller companies are a good indicator of business growth opportunities, as well as knowledge about skills important to the company.
In order to gain internal information about the company, try to get personal interaction with employees of your target. Human Resources departments sometimes hold job fairs or community outreach allowing you to get more information about the employees and their opinions. Research into newsgroups and mailing lists can turn up topics of interest to the company. Knowledge of regulatory environments for the company's customers is critical for interview stages.



This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, 

Social engineering undoubtedly is an integral aspect of information security and is a growing, respectable career field for professionals who value information security awareness and wish to play an active role in protecting security controls that govern the processes, operations, and transactions of any organization and add a distinct value within the institutional culture that informs and influences employee behavior. Social engineers are hired on both contract and permanent basis by independent IT/ Security consulting companies and government agencies to target client organizations in order to identify vulnerabilities that could cause important information to be compromised from their respective networks and system and thereby provide them with guidelines and recommendations to prevent this security threat.



  • Researching for rewards


  • Use Public Relations and Human Resource departments to gain personal interaction with employees.


  • Job fairs and outreach programs are a good way to gain face time with the target company.


  • Internships are a great way in for candidates recently out of educational work.
    Making the contacts


  • Blend in for personal interaction, and be flexible with your responses.


  • Try to keep talking at a higher level; don't overload the person with all your skills.


  • Find out background information, such as compliance or regulatory environments.


  • Be aware of contractual issues within a particular job or industry.
  •  

    Facebook Privacy : keep Your Account Protected

    1. Your name, your profile picture, your gender, your current city, the networks you’re in, who you’re friends with, and the pages you’re a fan of are available to anyone. These are known as publicly accessible information (PAI). You have no control over this.
    2. Any other piece of content marked visible to “Everyone” in your privacy settings is available to anyone. You have control over this.
    3. Any Facebook application or web site using Facebook Connect that you visit can access your PAI and content marked visible to “Everyone” in your privacy settings. You have no control over this.
    4. Any Facebook application you log in to or web site that you connect with your Facebook account can access all of your profile information (except for contact information), photos, videos, notes, events, groups, links, and notifications, regardless of your privacy settings. You have no control over this.
    5. Any Facebook application your friends log in to or web site your friends connect with their Facebook account that you have not also logged in to or connected with can access your information and content based on your application, profile, and content privacy settings. You have control over this.
    6. Any wall post a Facebook application or web site using Facebook Connect makes on your profile is visible to anyone who can view your wall. You have no control over this.
    7. Any change to profile information or feedback on content will generate a story on your wall visible to anyone who can also access the information or content. You have no control over this.
    8. Profile information, photos, videos, and notes are visible to other users based on your profile and content privacy settings. You have control over this.
    9. Events you’re invited to are visible to other users who can also view the event. You have no control over this.
    10. Past status updates and links are visible to other users based on the privacy setting used when posted. You have no control over this.
     

    Essential Network Security Tools for Hacking

      Wireshark

    Wireshark logo Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tshark is included. One word of caution is that Wireshark has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).

      Metasploit

    Metasploit logo Metasploit took the security world by storm when it was released in 2004. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their list of modules. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality.
    Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants. The Framework itself is still free and open source, but they now also offer a free-but-limited Community edition, a more advanced Express edition ($3,000 per year per user), and a full-featured Pro edition ($15,000 per user per year). Other paid exploitation tools to consider are Core Impact (more expensive) and Canvas (less).
    The Metasploit Framework now includes an official Java-based GUI and also Raphael Mudge's excellent Armitage. The Community, Express, and Pro editions have web-based GUIs.

    Nessus

    Nessus logo Nessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source, but they closed the source code in 2005 and removed the free "Registered Feed" version in 2008. It now costs $1,200 per year, which still beats many of its competitors. A free “Home Feed” is also available, though it is limited and only licensed for home network use.
    Nessus is constantly updated, with more than 46,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a web-based interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. The open-source version of Nessus was forked by a group of users who still develop it under the OpenVAS name

    Aircrack

    Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

    Snort

    Snort logo This network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.
    While Snort itself is free and open source, parent company SourceFire offers their VRT-certified rules for $499 per sensor per year and a complementary product line of software and appliances with more enterprise-level features. Sourcefire also offers a free 30-day delayed feed

      Cain and Abel

    UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols

    BackTrack
    This excellent bootable live CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernels, etc.


     NETCAT
    This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections.
    The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its popularity. It can sometimes even be hard to find a copy of the v1.10 source code. The flexibility and usefulness of this tool prompted the Nmap Project to produce Ncat, a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more. Other takes on this classic tool include the amazingly versatile Socat, OpenBSD's nc, Cryptcat, Netcat6, pnetcat, SBD, and so-called GNU Netcat
    Tcpdump
    Tcpdump is the network sniffer we all used before (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI and parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with less security risk. It also requires fewer system resources. While Tcpdump doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. tcpdump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap and many other tools. Read 1 review.

      John the Ripper
      John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. Its primary purpose is to detect weak Unix passwords, though it supports hashes for many other platforms as well. There is an official free version, a community-enhanced version (with many contributed patches but not as much quality assurance), and an inexpensive pro version. You will probably want to start with some wordlists, which you can find here, here, or here.

    Kismet
    Kismet is a console (ncurses) based 802.11 layer-2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/tcpdump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, etc.


     Ping/telnet/dig/traceroute/whois/netstat


    While there are many advanced high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although more advanced functionality is available from Hping and Netcat.
     
     
    Support : Ebin EPhrem | Ebin Ephrem | #Gabbarism
    Copyright © 2011. Services | Embedded Support | Reviews | Virtual Technologys - All Rights Reserved
    Template Created by ebinephrem.com Published by Ebin Ephrem
    Proudly powered by Blogger