Hey, it’s a Monday evening and you’re sitting down with some snacks in a mog,
And now you switch on your device data connection and you got excited to see an old friend of yours sent a friend request.
“Fantastic!” you think finally am not gonna be bored again, cause you have got a lot to discuss with your friend, and after clicking on the notification, your messenger or social network menu comes up and after a few time loading you got a freezing message “session expired”, “session logout”, “please verify your number”, “you have been logged out”.
Then you feel down and got your snacks mog slammed on the floor after some few attempt to log in, you realized your account has been hacked!!!.
The question that runs first into your mind is, How did this hacker manage to hack my account?.
I didn’t login into anywhere nor expose my passwords,
lol man, a social engineering attack has been played on you, anyway don’t panic that’s not the end of life.
So in this article today I will explain deeply to you the following👇👇
- How Hackers Make Use Of Social Engineering.
- What is SEToolkit and all you need to know about it?
- How to keep ourselves safe/remedies from social Engineering attack.
What is Social Engineering?
How do hackers make use of social engineering?
- They would make some observation on the victim’s account, his profile, his friend list, his uploaded pictures, areas of interest, and this process is called INFORMATION GATHERING
- Now the hacker will note your area of interest, and now it’s the approaching time, they will send you a gentle friend request, and after 2 to 3 days, they hook you up with something like “Hey Benson, it’s been long”, what word is like a killing word and now you start up a conversation with them.
- After some few days or weeks, after which they grab your trust, the next thing they do is send a phishing link, malicious apps e.g keyloggers, spyware, let’s take for example you are a game lover, you love to play online games.
- they will come to you with a game phishing link that will require you to login in your account credentials before you can play the game, lol but to me, I name this method “WE USE THEIR GREED TO GET THEM” but it could still be categorised under phishing attack and keylogging attack.
What is SEToolkit?
SEToolkit is an open-source penetration testing framework that is developed by David Kennedy (ReL1K) to helps social Engineering attack easy.
For Kali Linux users, SEToolkit is a pre-installed tool but for Android lovers who is using Termux, GNUroot and so on Here is How To Install SET On Your Android terminals
How do we prevent ourselves from social Engineering attack?
Here are remedies have been using so far that has been helping out.
- Tighten Up your privacy, that’s the first, not all friend requests you see you accept, filter messages you reply too, don’t just trust any messages you see.
- Never ever click on links that require you to log in your details, don’t ever click on links that don’t have https://, visit those with https:// only.
- Reduce the information you provided about your self on the social network, stop the act of posting your pictures online, you feeding your information to millions of people and you can’t control that.
- don’t ever make use of a cheap and guessable password, use a password that will take a hacker more than a year to crack e.g add @#$&+- things like this to your passwords.
- And lastly, trust no one.
Best view you can finde , in this side of world!
Can I simply say what a comfort to uncover somebody that actually knows what they are discussing over the internet. You certainly know how to bring an issue to light and make it important. More and more people have to look at this and understand this side of the story. I can’t believe you aren’t more popular since you surely have the gift.
Good post however I was wondering if you could write a litte more on this subject? I’d be very thankful if you could elaborate a little bit further. Kudos!