1 hour 31 minutes
Now we're gonna do a lot of identity, Jack
Now, because I don't have a volunteer. I'm just going to use some random names. I'm gonna choose the most common Western surname, Smith. I'm not going to use any special tools to do the identically hack. All I'm going to use is an Internet connection,
so the first thing I'll do is I'll go into P I. P o dot com. P appeal is a great tool because you concert up almost anyone based on their name, their email address, used name or fire, a phone number.
You can also narrow the search down by looking at their location.
So let's look for the first person.
Let's type in pay to Smith.
I'm just gonna leave the location as blank,
so let's just pick the very first person
piece of G, Smith says. Now searching the deep Web. It's searching through over 80 different social media accounts that Peter may have
here. I can see his age. I can see that he's male. I can see his career. I can also see his education, his username,
any additional names that can be picked up from social media feeds any places that he's checked into as well as associated with.
Now the associated with is very important because it shows family members. So I've got Manda, Belinda, et cetera, et cetera, et cetera. When I scroll down from here,
I could go further and I can look at his LinkedIn profile. His Facebook page, his Google plus page, et cetera. Being verified allows me to get a background report. There is a small fee for this, but I'm not going to do this in this case.
Background report includes things like his credit racing
as well as his criminal records.
As you can see, this is very, very powerful. Let's change the name and let's go with a Tom Smith
again. I leave the location as optional.
So now I'm gonna choose the second Tom,
who's based in Phoenix.
Here again, I can see his career. I can see his education. I can see his username. But now I've also got a telephone number. I can also see the places that he's checked into, including his work. So now what I'm gonna do is I'm going to go into his Facebook profile.
So here I have his Facebook profile.
I haven't connected with him. If I had connected with him, it wouldn't say. Do you know this person?
What I'm gonna do is I'm gonna go into his photos.
These are a ll public facing photos.
I'm going to go into his albums and here I have a video that shows a happy birthday. So by looking at this by looking at the date and the time, I can now see Williams Date of birth. I'm not going to do this because I haven't got permission to do it.
Let's go back to PR PR and choose my next Smith. Sorry. Let's choose I Sarah Smith
again. I'll leave. The location is optional.
And let's go with the 1st 1
so I can see that she's 28 years of age. She's a teacher. I can see her family members down here. I can also see the places that she's checked into,
scrawling further down. I can see that she's gotten Amazon wish list, so I'll click on this
and I can see what things that she might be interested in here. She's got a book by Danielle Steel.
Let's go back to PR Pia and choose another person.
So let's go with Michael Smith.
Okay, again, let's just choose the 1st 1
So we have his age.
We've also got some fine numbers here.
I've got his family members,
and if I scroll down the bottom here, I've also got his address. So if I click on this link here, which I won't do, I have his address by going to white pages.
let's go to one and Smith,
so we can see she is 50 years of age. I've got her phone number.
I can see who her family members are. I can see here linked in profile. I can see her Amazon wish list
if I scroll back up because I missed this. I've even got who work address.
Let's choose one more and we'll go for a Paul Smith.
I would describe the 1st 1
So here I've got Paul Smith. He's 36 years of age.
Scroll down. I can see his linked in profile as well as his Facebook profile. So click on this
again. I haven't connected with Paul before, so I'm looking at his public profile page.
So if I click on about,
I can see his work and education
when I scroll down,
I can see all of his friends.
I can view his photos.
I can see any sports said he likes
as well as movies and
books, et cetera.
All this information is really useful.
One of the most important things to remember when you're doing a live identity hack is to only show a small snippet of information you don't want to. Doc's a volunteer. You don't want to show everything about them that can be used for identity theft.
You just want to show a mere hint as to hey,
here is where I can get access to your data birth.
Here is where I can get access to your phone number. Here is where I can get access to your place of work, or here is where I can get access to where you live.
You don't necessarily need to show exactly how to do it. By doing this, you're comforting the volunteer but also proving how easy it is to do so Now that you've got these three pieces of information,
how easy is it to take this information
and do something with it?
In this online course, you will learn how to craft the perfect phishing email to ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Certified Information Systems Security Professional (CISSP)
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to ...
19 CEU/CPE Hours Available
Certificate of Completion Offered