Posts tagged with: social engineering

Authentication ~ Intro


Ever watched a movie where the villain breach over the security system of a corporation or a secret lab using some sort of tools, like wearing mask or fake fingerprint to bypass the body scanning authentication, using voice changer to bypass the voice authentication, or even just use a notebook to crack the password of a gate? I bet most of you had. There are tons of films like that such as Mission Impossible, Spy Kids, and other Thrilling Spy Action related film. As you can see in the film. The corporation have already implemented a very strong authentication method on their system. Yet the villain always able to breach it easily. Okay, that is just a film. But you know that those things might actually happened in real live. And when that happen, all of us will be in serious trouble. No account will be save, no authentication method that won’t be breached, and worse the internet will be in a great disaster.

With the fast growth of information technology nothing seems to be impossible now. Security is one thing that Continue Reading


Social Engineering ~ Definition and Tool

In this post I’ll explain about the definition of social engineering and the tools to do it. Although its only a little and not in detail, but I think its enough to help you understand better about Social Engineering.

Lets talk about vulnerability first.
Vulnerability, is a weak point that exist on a system. This vulnerability is not only on the hardware and software, but also on the environment, the network and also the administrator/user. Social Engineering is the technique to attack the human vulnerability, usually the biggest vulnerability that exist on the human is the Low Security Awareness. Continue Reading