Deep Inspection of Online Personas

I found myself a new online toy. It is called Pipl and it is all about finding people online. Obviously, the concept behind the tool is not new. There are other tools that does the same, but this one is incredible accurate and verbose. It is a must toy in the arsenal of any serious penetration tester/attacker.

Of course, I went ahead and looked up several people I know and various security researchers, etc. [...]

more | comments | comments rss | posted by

Social Networks Evil Twin Attacks

What will happen if someone impersonates you on a social network? Will that person be able to fool your friends and as such gain access to resources, which only you are entitled to?… or are social network protected enough to guarantee the credibility of the social participants.

Introduction to Social Networks Evil Twin Attacks

Lets have a look at a social network like LinkedIn. [...]

more | comments | comments rss | posted by

Zero Degrees of Seperation

For those who are not familiar with the idea behind the Six Degrees of Separation I recommend that you check the Wikipedia link at the top before going any further.

To sum up, the Six Degrees of Separation depicts our small world. On average, everyone on this planet is reachable within six steps. This means that there are around six people between me and George Bush Jr. for example. I’ve read quite a lot of on this matter but I’ve never really though about it until today. [...]

more | comments | comments rss | posted by