Encore: credential stealing (verb) [Word Notes]
Hacking Humans22 Elo 2023

Encore: credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(771)

Easier to trick than to hack.

Easier to trick than to hack.

Dave dodges a local theater scam. Joe shares survey results from Black Hat attendees. A listener's calendar pops up alluring invitations. Carole Theriault interviews Sophos Naked Security writer Mark ...

4 Loka 201835min

Kidnappers, robots and deep fakes.

Kidnappers, robots and deep fakes.

Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and h...

27 Syys 201828min

Stringing along a scammer.

Stringing along a scammer.

Dave warns of scammers taking advantage of hurricane Florence, both on the phone and in person. Joe shares a scheme targeting the kindness of local churchgoers. A cosmic variation on the Nigerian emai...

20 Syys 201829min

Influence versus manipulation.

Influence versus manipulation.

Joe describes a law firm impersonating a rival to funnel business away from them. Dave has a story of pontiff impersonation. Our guest is Joe Gray from Advanced Persistent Security.  Links to stories ...

13 Syys 201830min

Real estate transactions in the crosshairs.

Real estate transactions in the crosshairs.

Dave gets scammed on an exit ramp. Joe describes real estate transaction scams. Is LinkedIn moonlighting in Himalayan tourism? Guest Asaf Cidon from Barracuda Networks shares social engineering trends...

6 Syys 201830min

Red teaming starts with research.

Red teaming starts with research.

Joe describes an Office 365 phishing campaign. Dave warns of dangerous USB cables. A listener shares a fax from the UK. Joe interviews security consultant and pen tester Justin White. Links to stories...

30 Elo 201830min

Telling the truth in a dishonest way.

Telling the truth in a dishonest way.

Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness ...

23 Elo 201830min

Sometimes less is more.

Sometimes less is more.

Joe shares the story of a retiree scammed by a clever scheme. Dave describes a tech-support scam with a Russian twist. Our Catch of the Day features an adorable puppy. Guest Michael Murray from Lookou...

16 Elo 201836min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
rss-kaikki-uusiksi
aihe
linda-maria
et-sa-noin-voi-sanoo-esittaa
rss-ulkopoditiikkaa
rss-mina-ukkola
rss-girls-finish-f1rst