So now what we're going to do is we're going to go through the presentation component
or what you will have done up until this point is grabbed your volunteer onto the stage and introduce them by night.
One of the key things that we look at from a hacking perspective is looking at people's social media profiles. It is amazing the amount of information we can get from a person's social media accounts. But what I do for those people that don't really understand what social media is, I'll go through
different types of social media,
and I like to use the doughnut analogy. So if I'm utilizing Twitter, I'm going to tweet out. I'm eating a hashtag doughnut.
If I'm using Dropbox, I'll say I've saved my doughnut into my Dropbox folder.
YouTube. Here I am eating a doughnut as a video on Pinterest. Here is a doughnut recipe that I've created
we've got our Iris s feed. Please subscribe to my doughnut.
Next up, we've got Google. Plus, this is where I ate my doughnuts.
Facebook. I like doughnuts on Instagram. Here is a vintage photo off my doughnut.
Linked in my skills include eating doughnuts
and blink kissed. This is my doughnut story.
So what a hacker will do is thou look at people's social media pages and build a profile about them. The more information that people post, the easier it is to utilize that information for identity theft. They're not only look at your own social media profile pages, but also look at
other people's social media profiles.
They'll look at who you care about
and their designated into three main areas. First up are your points
friends. You exhibit high levels of interaction with these people. This means that you communicating with them on a regular basis might be daily might be weekly might be hourly.
The best part about this is that because he communicating with Umbridge, Italy,
you will let your guard down as to what information you post
or alternatively, they let down their guard and post information about you
that you may not want online.
The next type of person
is a stalker. These friends consistently interact with you and monitor your activity.
These people could be mined for further information about you,
and I'll give you a good example. Here I was doing a live identity hack on a person, and I was finding it really difficult to find their date of birth. So what I did was I moved away from their own social media profiles to their friends, social media profiles.
I didn't need to connect with them,
But as I was trolling through the information, I found a post off one of their friends where they were wishing my target a happy birthday and, in fact, that had a photograph on their saying Happy 30th birthday now because it displayed the date and the time
I knew exactly what their date of birth waas and it became very easy.
The final type of person I called liabilities.
These friends consistently tag you and posts and photos exposing your daughter,
and they could be used to weaken your defense around what information is posted about you.
You might be very vigilant on what information you post, However, if they're tagging, are you in their own posts, et cetera.
You have no real control over that,
and so again, this could be used against you.
The final thing that a hacker will do is that I look at your activity status so they'll look at when you are most active,
some might be. They are active first in the morning and only in the morning or, alternatively, there going to be an after dinner socialites. So let's go through and show you how easy it is to gather this information.
All I'm looking for is a person's name,
address and date of birth.
Now, I've already got the first piece of information day and night
because you volunteered that information.
So how easy is it for me to get
your date of birth and your address?
This is where I go into doing the live identity back.