The engineering is being able to manipulate people

The local websites that I decided to scan are:http://seo-without-brders.

com:On my first website, I only found  HTTP (port 80) and HTTPS (port 443) open. The FTP (port 21), SMTP(port 25)  and SMTPS(port 465) were closed. Open ports like port 80 and 443 are not a security risk.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

It is important for both of these ports to be open because otherwise users will not be able to connect to the web server.After a few attempts on finding flaws on different website I was able to find a flaw on my next example:      B) www.cohoesfarmersmarket.comOn this website, I found ports HTTP (port 80), HTTPS (port 443) and FTP (port 21) open. SMTP (port 25)  and SMTPS (port 465) were closed. I think that having port 21 open can be a little risky. Since, FTP messages are sent without encryption (they are just cleartext), it is easy for hackers, that have a packet sniffer, to view and collect usernames and passwords that control the FTP directory.

This way a hacker can obtain information and take control of the permissions on FTP. It could also give access for hacker to download malicious software, allow users to use that FTP server to scan other computers and collect information, to send malicious emails or even create a DoS attack. For this reason if port 21 can be kept close I would advise to do so.       II.

Social Engineering: Social engineering is being able to manipulate people to give up important or classified information. When criminals target individuals is because usually they are trying to obtain some type of information that can help them, for example, collect passwords to their company’s accounts and that way be able to install malicious software to further gather information and access more important information of that company. That could include: different bank accounts they might have and clients information.  For example, it is much easier for a criminal to gain an individual’s trust than to try to hack their account and get caught by trying to do so. Gain Trust:The first thing a criminal would try is to befriend you. The first thing I would do is pick a group of people in this company. The people I talk to doesn’t necessarily have to be in the IT department but if one of them is part of the IT department then even better.

Makes my job a lot easier.  I would probably go to one of their gatherings in a local bar and start talking to people. When I find my group of people, I would ask for some type of social media request. Right then and there I have their emails and basic information. Now, I can start trying to hack their emails. I would send them an email with a link and since they trust me, they will probably click on this link without knowing that they got infected with malware and I just got control of their computer and have collected enough information on them and their contacts directory.

I could also send them an email with a picture that as soon as they download it a malicious software gets embedded to their computer giving me access to everything on it ( also called baiting). Distrust between them (blackmail):Another way I can get access to their information, would be by first befriending them on that gathering they had on the local bar. After getting to know them and going out with them, I would create some type of problem between this group of friends I made. They won’t know it was me and at the end I will be the one stepping in as a hero or support buddy (that person they could count on for that moment)  and thus, creating distrust between them but gaining their trust and probably collecting information of private stories they have about each other.

This way I can use this information to blackmail them and getting full disclosure on information I need to access the company’s accounts.(Altercasting) Forcing targets into a role:With this same group of “new friends” I have targeted. I could come up with a really sad story(my example is a little cruel but is just an example), like for instance I have no money and my brother (that I don’t have) is in need of medicines. He recently got robbed and beat up on a vacation trip and I want to come up with a fundraiser to gather money. So, I ask for the company Info Leak Inc. to sponsor me and give me access to their bank account information so people can send the money their. But I just got their bank information so now I can do pretty much whatever I want with this information. I can even transfer money from the company’s account to mine.

Tailgating:There’s also tailgating. I could impersonate a delivery driver who’s waiting on the outside of the companies door. Wait for someone to open the door and gain security’s approval by going inside with the person who just opened the door for me (creating a conversation), thereby gaining authorization to go wherever I want.

In this case, is a great example for a small company such as  Info Leak Inc. were there is really not that much access control. It could be harder for a bigger company because most of them require access by swiping a card or a swipe of a card and a code to open such doors.These are just a few of the many alternatives of social engineering attacks.