TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How I attacked a fellow student

173 点作者 jmonegro大约 12 年前

15 条评论

guylhem大约 12 年前
The title is a bit misleading. It's not an attack, more like well done social engineering.<p>But the context is very helpful - especially with the amount of detail you provide, along with the email exchange, one can see the target was totally abused.<p>The lanyard, laptop, false recruiting - you really overdid it, but I mean that in a positive way. I like it, it's so great - you could almost make a movie out of it ;-)<p>That's creative thinking. Congrats on your victory.
评论 #5630539 未加载
评论 #5630931 未加载
评论 #5629975 未加载
ivybridge大约 12 年前
You would have been better off forcing them to register on your site to submit the resume, then check if they reused a password. Also you exploited trust in a way that could easily lead back to you.
评论 #5629695 未加载
noonespecial大约 12 年前
The best attacks are always the ones where the victim is truly surprised at how far you were willing to go to pull it off. So are the best magic tricks.
评论 #5631683 未加载
bluehex大约 12 年前
I felt pretty bad for the target. Even though he was fairly warned, and knew to expect social engineering attacks, you could see he was quite excited about the potential opportunity at X co; else he wouldn't have put so much energy into that looong email exchange. Poor, guy. But good lesson, I suppose.
评论 #5630179 未加载
cdwhite大约 12 年前
Google cache: <a href="http://webcache.googleusercontent.com/search?hl=en&#38;q=cache%3Ahttp%3A%2F%2Fshaanan.cohney.info%2Fblog%2F2013%2F04%2Fthe-attack%2F" rel="nofollow">http://webcache.googleusercontent.com/search?hl=en&#38;q=cac...</a> (Page is taking some time to load.)
shmageggy大约 12 年前
I thought "Please find attached herewith my resume for your kind perusal" was a joke but apparently that's how this person really responded. Recruiters: how does this forced, over-formal tone affect your impression of a candidate?
评论 #5630359 未加载
评论 #5630239 未加载
评论 #5630116 未加载
jabbernotty大约 12 年前
&#62; With this level of trust it would be feasible to gain access to information protecting online accounts, a very scary thought.<p>Does he mean 'feasible to gain access to login information for online accounts'? I have read the page, and i'm not seeing it. Yes, according to the page they had access to some degree of personal information beyond the more publicly accessible. But that isn't the same as having access to their online accounts, or being near to getting it.
评论 #5629689 未加载
评论 #5629479 未加载
评论 #5631546 未加载
louthy大约 12 年前
Very enjoyable read. Congratulations on your success, I can only imagine how stunned they were!
sohamsankaran大约 12 年前
Interesting. If the author is still around, I have a question - would the whois data have given you away, or was this faked/spoofed in some way?
评论 #5630681 未加载
评论 #5632639 未加载
jsumrall大约 12 年前
I was hoping that by getting them to sign up with the recruiter you would have used that to intercept communication.
tempestn大约 12 年前
Is Xrecruting.com a typo in the blog post, or in the domain actually registered?
评论 #5629694 未加载
cbhl大约 12 年前
Found this a rather amusing read. Best of luck on your exam!
justx1大约 12 年前
Well played...<p>Missing to redact X.com's phone number allows "social engineering" of the company name, though.
评论 #5630754 未加载
pit大约 12 年前
Wait a minute. Isn't this guy an asshole?
iancarroll大约 12 年前
Duplicate.
评论 #5629691 未加载