No announcement yet.

The Footprinting Process - Social Networking

  • Filter
  • Time
  • Show
Clear All
new posts

  • The Footprinting Process - Social Networking

    One of the better sources for information is social networking. Social networking has proven not only extremely prolific, but also uncredibly useful as an information gathering tool. A large number of people who use these services provide updates on a daily basis. You can learn not only what an individual is doing, but also all the relationships, both personal and professional, that they have.
    Because of the openness and ease of information sharing on these sites, a savvy and determined attacker can locate details that ought not to be shared. In some cases, work information, vacation informtion, working relationchips, and location data can be found. In a social engineering attack an attacker can use this information to establish contact and build a sense of trust.
    Social Networking can be both a benefit and a problem at the same time. On the one hand, the ability to advertise, spread messages, and share information is powerful and beneficial. On the other hand, an attacker may find the networks and their information useful to attack you. This is something that you will have to keep in mind when allowing use of these services within an enterprise.
    Some social networking sites that are worth scouring for information about your target may be Facebook, Twitter, Google+, LinkedIn and other sites of that nature.
    Some tools might assist you in finding information and the relation between the bits and pieces. One such tool is Maltego, which is designed to illustrate the relationshops between people, groups, companies, organizations etc.
    Certified Security Geek