Time
1 hour 31 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Hello and welcome back to this next section on how to do a live identity hack. In this episode, we'll be discussing how to profile your volunteer. One of the areas that you need to look for is choosing the right volunteer. I've had several environments where, unfortunately, I chose the wrong volunteer,
00:19
and I'll be explaining some tips and tricks on how you can stay safe yourself
00:23
and choosing the right volunteer by utilizing social engineering techniques.
00:28
This is really important because you want this presentation to go without a hitch.
00:32
One of the first questions that I get asked us, Do I need a volunteer
00:36
or you need a volunteer? Because the whole premise of the presentation is you're doing a live identity hack on an individual, so choosing a volunteer is critical for the presentation itself to succeed.
00:50
Why do you need to choose a volunteer? Well, like any good presentation, you want to be able to control the outcome. So by being out to determine who the volunteer is, you're not leaving things to chance.
01:03
Tops of volunteers that is suitable are ones that are very social.
01:08
And what I mean by social is anyone that is active on social media platforms. These social media platforms include things like Facebook, Twitter, instagram, Google plus ET cetera.
01:23
The more active they are, the more successful that you're going to be in doing this presentation.
01:30
What happens if you can't get a volunteer?
01:33
Well, there's a couple of stars that you can go through one. If you have some pre canned information, you might just work off that.
01:42
I've done that before. And it's not as successful as a true life. Identity had presentation. Alternatively, what you can do is just choose random names
01:56
when you choose random names, as I'm about to do in this demonstration, you're not going in and doing the identity hack on any one individual, and that there is really critical.
02:09
The reason being is is if you focus on just one person where you're trying to get their address, their data birth, I enough information to know identity theft.
02:23
If that person finds out that you've done that and that you've done it publicly, you could be in a world of hurt. They could potentially sue you so by just grabbing snippets of information from different people, and it could be in different countries it convey in different states, et cetera.
02:40
You're just providing a taste off the information
02:45
that is readily available.
02:46
What also recommend that you do is that you have a back up off. This is well, so, for example, if you can't get a volunteer, what you may want to do is you might want tohave are some common names that you've already checked out that you know are going to work.
03:05
The last thing you want to do is choose a random person,
03:07
and it doesn't come up with any information because again, then the demonstration doesn't look very good.
03:15
So how do you go about staging for success?
03:19
Well, I work off one of three principles when it comes to choosing my volunteer.
03:24
Let's go through these options now.
03:27
The first option is to ask for a volunteer a couple weeks before the event What our deal is. Our contact the organizer's off the conference or the speaking engagement on Ask for them. Thio, identify volunteer. I'll set some criteria for the volunteer,
03:43
the main one being that we need somebody that is very active in their social media profiles. I somebody that is utilizing or engaging in Facebook, Twitter, instagram, Pinterest, etcetera on a very regular basis. So what are the pros of this? Well, this allows you to profile the volunteer to ensure success.
04:03
You can have a look at that profile. Why in advance
04:06
and even build the presentation before you go and present it by having an offline demonstration. It enables you to ensure that everything goes smoothly. There was one time I did a presentation. I had chosen a random audience member,
04:23
and as we started going through the Facebook profile,
04:27
the guy went want.
04:29
As I looked up at the Facebook screen, it showed him with a photograph of him in a yellow dressing gown and bright yellow chicken slippers. He was really, really embarrassed by it, and he forgot that he posted this Facebook picture on his profile.
04:46
So you want to ensure that the volunteer that you work with them on the presentation itself?
04:53
What I always do with the volunteer is I will go through the presentation with them beforehand to ensure that than Stan exactly what information I'm showing them and that they approve that information being shown publicly.
05:09
A good example, that is, I worked with another volunteer and I was going through the presentation with
05:15
and she was quite happy to form A to show some basic information about her Children. But she didn't want me to show some posts on Facebook where those kids played football or soccer or where they did ballet.
05:30
And so I was able to remove that particular slide from the presentation itself.
05:35
It also allows you to check the information with your volunteer to make sure that it is correct. How do I go about doing this? Well, I'll ask for the volunteer
05:47
and sometimes they'll ask May. Well, why why you actually wanting to get a volunteer beforehand and that's when I'll talk to them and I'll say, OK, look, the reason why I want to volunteer is because I want to make sure that one, the presentation goes smoothly and two,
06:04
that the bones here is comfortable with the information that I'm presenting because
06:09
we are dealing with sensitive information here and that's really important. I use the same lines.
06:15
When I talk, Thio volunteer themselves. I want to reinsure them that the information that I'm providing to the audience, which can be a bunch of complete strangers that they're comfortable with it.
06:29
One of the downsides of doing a presentation like this is that some people within the audience may realize that it is a staged presentation.

Up Next

How to Do a Live Identity Hack

This course has been specifically designed to successfully deliver a live identity hack presentation to an Australian, American or British audience.

Instructed By

Instructor Profile Image
Tom Mason
Senior Partner Development Manager at AWS
Instructor