Posts

Showing posts from January, 2021

John the Ripper

Image
 Here is an introductory look into how to use John the Ripper for password cracking. Slides can be found  here

Social Engineering Theories

Image
This video covers several useful theories and principles used in social engineering. Think of it as building blocks that can be used. Quite a bit of this comes from scholarly work in psychology. It contains brief overviews of specific topics, definitely look into it more for a better understanding. This video was produced for academic purposes for identifying Social Engineering practices. This is not an endorsement of any illegal activity. I think the part from 8:22 on is the most informative since it comes from a research paper I found specifically about social engineering attacks. The video covers: +Mere Exposure Effect (0:47) +Theory of Planned Behavior (4:04) +Modes of Communication Styles (meh) +Anatomy of Social Engineering Attacks (8:22)      *Principles of Persuasion (Authority, Reciprocity, Conformity, Commitment, Scarcity) (9:04)      *Frequency of Persuasion Principles used (16:23)      *Number of steps used before compliance (17:51)      *Occurrence of principles by step