Time
1 hour 31 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
So now what we're going to do is we're going to go through the presentation component
00:04
or what you will have done up until this point is grabbed your volunteer onto the stage and introduce them by night.
00:15
One of the key things that we look at from a hacking perspective is looking at people's social media profiles. It is amazing the amount of information we can get from a person's social media accounts. But what I do for those people that don't really understand what social media is, I'll go through
00:34
different types of social media,
00:36
and I like to use the doughnut analogy. So if I'm utilizing Twitter, I'm going to tweet out. I'm eating a hashtag doughnut.
00:45
If I'm using Dropbox, I'll say I've saved my doughnut into my Dropbox folder.
00:51
YouTube. Here I am eating a doughnut as a video on Pinterest. Here is a doughnut recipe that I've created
00:59
Next up,
01:00
we've got our Iris s feed. Please subscribe to my doughnut.
01:04
Next up, we've got Google. Plus, this is where I ate my doughnuts.
01:10
Facebook. I like doughnuts on Instagram. Here is a vintage photo off my doughnut.
01:15
Linked in my skills include eating doughnuts
01:19
and blink kissed. This is my doughnut story.
01:23
So what a hacker will do is thou look at people's social media pages and build a profile about them. The more information that people post, the easier it is to utilize that information for identity theft. They're not only look at your own social media profile pages, but also look at
01:42
other people's social media profiles.
01:45
They'll look at who you care about
01:48
and their designated into three main areas. First up are your points
01:53
friends. You exhibit high levels of interaction with these people. This means that you communicating with them on a regular basis might be daily might be weekly might be hourly.
02:04
The best part about this is that because he communicating with Umbridge, Italy,
02:08
you will let your guard down as to what information you post
02:13
or alternatively, they let down their guard and post information about you
02:19
that you may not want online.
02:22
The next type of person
02:23
is a stalker. These friends consistently interact with you and monitor your activity.
02:29
These people could be mined for further information about you,
02:32
and I'll give you a good example. Here I was doing a live identity hack on a person, and I was finding it really difficult to find their date of birth. So what I did was I moved away from their own social media profiles to their friends, social media profiles.
02:49
I didn't need to connect with them,
02:51
But as I was trolling through the information, I found a post off one of their friends where they were wishing my target a happy birthday and, in fact, that had a photograph on their saying Happy 30th birthday now because it displayed the date and the time
03:09
I knew exactly what their date of birth waas and it became very easy.
03:15
The final type of person I called liabilities.
03:19
These friends consistently tag you and posts and photos exposing your daughter,
03:23
and they could be used to weaken your defense around what information is posted about you.
03:30
You might be very vigilant on what information you post, However, if they're tagging, are you in their own posts, et cetera.
03:39
You have no real control over that,
03:43
and so again, this could be used against you.
03:46
The final thing that a hacker will do is that I look at your activity status so they'll look at when you are most active,
03:54
some might be. They are active first in the morning and only in the morning or, alternatively, there going to be an after dinner socialites. So let's go through and show you how easy it is to gather this information.
04:10
All I'm looking for is a person's name,
04:13
address and date of birth.
04:15
Now, I've already got the first piece of information day and night
04:18
because you volunteered that information.
04:20
So how easy is it for me to get
04:24
your date of birth and your address?
04:27
This is where I go into doing the live identity back.

Up Next

How to Do a Live Identity Hack

This course has been specifically designed to successfully deliver a live identity hack presentation to an Australian, American or British audience.

Instructed By

Instructor Profile Image
Tom Mason
Senior Partner Development Manager at AWS
Instructor