Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Information Gathering and Social Media Attacks to Gain Access

via YouTube

Overview

Explore information gathering techniques and social media attacks in this 35-minute conference talk from SkyDogCon 2011. Delve into the Evil Twin Attack, its origins, and mechanics through practical examples. Learn about creating fake LinkedIn accounts for information gathering, including profile creation and connecting individuals. Examine social media attack strategies, focusing on Facebook takeovers using tools like Firesheet and Firesheep. Discover social media tools like MarketMe and gain insights into enhancing social media security. Conclude with a discussion on the importance of documentation and contact information in cybersecurity.

Syllabus

Intro
Evil Twin Attack
The Evil Twin Attack
How this got started
How it works
Example
Information gathering
Fake LinkedIn accounts
LinkedIn information gathering
LinkedIn pictures
Linking people together
Filling out the profile
Social media attacks
Documentation
Evil Twin
Man in the Middle
Tools needed
Firesheet
Firesheep
Taking over Facebook
Social media tools
Marketme
Social Media Security
Contact Info

Reviews

Start your review of Information Gathering and Social Media Attacks to Gain Access

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.