Situated Research Psychology of Persuasion Do you want to be an agent of change? Psychological research reveals how to tip the balance in your favour. All human societies are alive with the battle for influence. In our personal lives the same struggle is played out for the supremacy of viewpoints, ideals and actions. Psychologists have been studying how we try to influence each other for many years. • 3 Universal Goals to Influence People – Effective influence and persuasion isn’t just about patter, body language or other techniques, it’s also about understanding people’s motivations. • The Persuasive Power of Swearing – Show your passion and people have one more emotional reason to come around to your point of view. • Loudest Voice = Majority Opinion – Even if only one member of a group repeats their opinion, it is more likely to be seen by others as representative of the whole group. • Don’t Take No For An Answer – You ask someone for a favour and they say no. • Are Fast Talkers More Persuasive? Image credit: Martin Howard
Wordlists & Password Profiling with CRUNCH, WyD, & CUPP Today I am going to show you how to use three (3) different tools in Linux (Backtrack 5) for creating targeted wordlists to help speed up and increase the chance of success for your dictionary attacks. I will be covering the use of CRUNCH for pure wordlist generation, and then I will cover the use of WyD and CUPP which use password profiling techniques to create targeted wordlists to narrow your attacks. I will provide the written walk through here with a video at the end. Let's begin with CRUNCH... CRUNCH is a wordlist generator based on the user specified character set. It takes the character set designated by the user and generates all combinations and permutations possible into a nice new wordlist for you to use in your dictionary/bruteforce tools. You will need to download and extract using the following methods: COMMAND: tar -zxvf crunch-3.0.1.tgz COMMAND: cd crunch-3.0.1/ COMMAND: make && make install Basic syntax of CRUNCH looks like this (See MAN Pages for details): o -t *^ssw@rd%
Home : F0rb1dd3n ~The Story is F1ct10n The threats are real Ingeniería social (seguridad informática) Ingeniería social es la práctica de obtener información confidencial a través de la manipulación de usuarios legítimos. Es una técnica que pueden usar ciertas personas, tales como investigadores privados, criminales, o delincuentes informáticos, para obtener información, acceso o privilegios en sistemas de información que les permitan realizar algún acto que perjudique o exponga la persona u organismo comprometido a riesgo o abusos. El principio que sustenta la ingeniería social es el que en cualquier sistema "los usuarios son el eslabón débil". En la práctica, un ingeniero social usará comúnmente el teléfono o Internet para engañar a la gente, fingiendo ser, por ejemplo, un empleado de algún banco o alguna otra empresa, un compañero de trabajo, un técnico o un cliente. Quizá el ataque más simple pero muy efectivo sea engañar a un usuario llevándolo a pensar que un administrador del sistema esta solicitando una contraseña para varios propósitos legítimos.
Home - OpenSearch You Are Not So Smart remote-exploit.org How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. If you want to be a hacker, keep reading. 1. 2. 3.
Schneier on Security Help Us, Hackers, You’re Our Only Hope, NSA Chief Tells DefCon Let's hope he wasn't carrying anything unsecured on his Blackberry. By Kelly Faircloth 7/30/12 8:53am Share this: General Alexander. Last week, hackers from around the world gathered in Las Vegas, Nevada, for the annual DefCon conference. The general’s appearance was far from the norm. Involved was a bit of flattery: “This is the world’s best cyber security community,” said Gen. As well as an appeal to principles: “You know that we can protect networks and have civil liberties and privacy; and you can help us get there.” And then a little bit more flattery: “Sometimes you guys get a bad rap,” he said. And finally just some outright sucking up: “That’s the real reason why I came here. Oh and by the way: No sooner had DefCon wrapped up than South Korean telecom KT Corp. was offering up apologies to the 8.7 million subscribers who’ve just had their information compromised. Follow Kelly Faircloth on Twitter or via RSS. kfaircloth@observer.com Tags: Hack Hack Hack Hack It Apart, NSA, defcon, hackers