![easy facebook hacking for dummies easy facebook hacking for dummies](http://www.hacking-tutorial.com/wp-content/uploads/how-to-hack-facebook-1.jpg)
![easy facebook hacking for dummies easy facebook hacking for dummies](https://www.fullversionforever.com/wp-content/uploads/Facebook-Password-Hacker-1024x794.jpg)
As featured in the classic cold-war film "Wargames," a wardialer dials thousands of phone numbers looking for a modem's carrier signal. Shipley recently conducted a "war-dialing" experiment and discovered that many networks in the San Francisco Bay Area are wide open to even novice hackers. "Don't underestimate the value of educating your staff," said Del Torto.
#Easy facebook hacking for dummies software#
Shipley answered with an exclamatory "NO," and Dave Del Torto, an software designer with Pretty Good Privacy, said: "People are absolutely pathetic about maintaining security policies, and social engineering is the easiest way in. "But aren't people more sensitized to now?" the attendee asked. To guard against such attacks, employees at organizations like the National Computer Security Association answer their phones by saying their extension number, or nothing at all. "If you want to hack NASA, go to Lockheed and get in through their connections," he suggested.īut some methods are even more straightforward and bold, Shipley said, such as entering an office building to steal something as benign as an employee phone list, or something as guarded as the map of a network's computers and software implementations.Įven easier, he said, are social engineering techniques, where a would-be intruder calls up a network engineer - or someone else with pertinent information - and simply asks what types of software and configurations, or port assignments, are being used in a network. "Look at all your inbound connectivity and co-developers," Shipley said, explaining that even if a network itself is well protected, there are often peer network connections, such as those at business partners, ISPs, or home modems, that can be used as back doors into a network.