02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Identity Theft 251<br />

Although some sites are moving away from the practice, it is not<br />

uncommon to run into websites that use standardized questions to assist<br />

users in gaining access if they lose their password. Questions such as your<br />

mother’s maiden name, the name of a childhood friend, your girlfriend’s<br />

or boyfriend’s name, and others are often used. The problem is that this<br />

information can be easily obtained using the footprinting techniques you<br />

learned about earlier in this book.<br />

To thwart attackers, websites have started to use passphrases and custom<br />

questions to strengthen security. In the latter case, users can enter their<br />

own questions along with the appropriate answers, making it possible to<br />

use questions that can’t be easily answered by an attacker.<br />

For example, in recent years Sarah Palin’s e-mail account was hacked, and Paris Hilton’s<br />

personal accounts and cell phone were hacked and photos posted online. Technically, they<br />

weren’t hacked in the technical sense of someone attacking the system and breaking in—<br />

rather, they had security questions that could easily be researched from publicly available<br />

sources. The answers were available to anyone who bothered to use Google. You may not<br />

be a celebrity, but once your personal information is online, it’s not personal anymore.<br />

Know What Information Is Available<br />

If you have googled yourself, you’ve learned firsthand what is available about you online,<br />

but you probably missed quite a bit. If you haven’t done so already, try googling yourself:<br />

See what types of information are available, and note the level of detail that can be found.<br />

Note whether any of the information gives clues about your background, passwords,<br />

family, or anything else that can be used to build a picture of who you are.<br />

Sites that may contain personal information include:<br />

■ Spokeo<br />

■ Facebook<br />

■ Myspace<br />

■ LinkedIn<br />

■ Intellius<br />

■ Zabasearch<br />

■ People Search<br />

■ Shodan<br />

There are tools that reveal more about a victim or target than a Google search does.<br />

Some companies mine, analyze, and sell this data for a few dollars without regard to<br />

who may be requesting the information or how it may ultimately be used. By combining<br />

information from multiple sources using social engineering and footprinting techniques,<br />

you can paint a pretty good picture of an individual, up to and including where they live in<br />

many cases.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!