Hindi ata working yan sir.Ayos to. May pagkaka similarity sila ni
You do not have permission to view the full content of this post. Log in or register now.
Yung main gmail ko at yahoo. Good. Walang bagas ng trahedya.
Pero yung dummy gmail ko. Mejo na exposed na yung first 5 letters ng pass ko. Haha
Ma change pass nga.
Social Engineering in häçking may mean, na inuuto mo yung tao to input their credentials sa isang lugar na may access sila, in this case is yung wensite, lahat ng inputed na pass, posible nakasave na yun sa database nila, pwede yun magamit sa Credential Stuffing (yung itatry nila sa lahat ng websites if magmamatch ba yung credentials, kadalasan kase same pass lang ginagamit sa ibat ibag websites). Ito pa, yung passwords list na nakuha nila can be used as a pwn.txt na ginagamit sa dictionary based attack like bruteforce (though low chance,pero mas oks na to kesa CUPP) . Hulaan ko, after itype ng nagvisit ng site ang email nila, tinype din nila yung password nila to check it. Madami pang posibilities. Tsaka if ever you wonder, bakit up pa rin ang sites nila diba (posibleng) may bad na galawan sila. Ito ang sagot, di sila makukulong kase di nman ninakaw nila yung credentials, ang user mismo nagbigay nito sa kanila, kapalit ng analysis na ino-offer nila.. win-win situation. Ever wondered why they know someone has the same password as yours? Database..Pwede mo pa po ba ma explain lalo? Mukhang interesting e.
Pinakadabest na Social Engineering tactics yung mga ganitong sites mga boss, parang crowd sourcing lang ito ng mga passwords at emails. Placebo Effect lang yung nangyayari guys.