Skip to Main Content
Hacking: The Next Generation
book

Hacking: The Next Generation

by Nitesh Dhanjani, Billy Rios, Brett Hardin
August 2009
Beginner content levelBeginner
298 pages
9h 5m
English
O'Reilly Media, Inc.
Content preview from Hacking: The Next Generation

Attack Scenarios

Now that we have covered the motives and information-gathering techniques an attacker can use to target an executive, we will identify potential attack scenarios an attacker can use to exploit an executive.

Email Attack

Email attacks are the cheapest attacks to pull off against executives. They have the potential to be very efficient and can have a high success rate if the email is from a member of the executive’s trusted circle.

Earlier in the chapter, we demonstrated ways to identify members of an executive’s corporate circle using network analysis and by harvesting social networking sites. In this attack scenario, we will be using public websites to identify a member who could be in the victim’s trusted circle.

Let’s use O’Reilly Media as our target. Assuming the attacker didn’t know the CEO of O’Reilly Media, he could use a social networking site, such as LinkedIn, to identify potential victims.

Identifying the executive to attack

Using “O’Reilly” as the company search term and “CEO” as the title search term returns 34 results. We quickly identify the profile for Tim O’Reilly, CEO of O’Reilly Media, as shown in Figure 9-9.

Tim O’Reilly’s LinkedIn profile

Figure 9-9. Tim O’Reilly’s LinkedIn profile

Unfortunately for the attacker, Tim has more than 500 connections, so LinkedIn is not going to help the attacker identify potential members of Tim’s trusted circle. The attacker will have to use another ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Building a Modern Security Program

Building a Modern Security Program

Zane Lackey, Rebecca Huehls
Network Security Hacks

Network Security Hacks

Andrew Lockhart
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9780596806309Errata Page