Admin 9 months ago
TheBAG819 #article

Virus and Social Engineering (part 2)

How Viruses are sent via Social Engineering

We touched upon the basics of the subject, in fact, I think this is the area that those who are interested in this subject really want to learn. I will try to provide information that will answer the question of what kind of social engineering I can send a virus to.

Nowadays, social engineering is traditionally done through Instagram . A virus can be transmitted from Instagram, any social networking platform, e-mail, any platform you can interact with from your device, whether over the internet or not. Let's talk about the purposes the hacker pursued when sending the virus. Let's touch on the subject a little bit

Why do hackers send virus ?

In fact, techniques can be used for many different purposes, but I will touch on two generally used purposes .

1.Stealing an account/information without setting a target:

If we think of a hacker who wants to steal an account, regardless of whether it is an Instagram or a game account , he can spread the virus from a site . This is a game cheat, it may target platforms that the society gravitates towards, such as click to download. Since the hacker has not determined a target or a victim here, he can spread the virus in areas where interaction is intense, so that even if one account is not down, he can take down a different account. The same can be done for attacks on people's data .

2.Being goal oriented:

If we are focused on the goal in social engineering, the things we will do are as follows; gathering information, processing the information, putting it into a scenario and applying it. In social engineering, since the scenarios will never be fully successful, the scenario is written only as a draft and the conversation is always played in a way that suits the scenario. While sending a virus, the person's interests are determined, knowledge is gained in these areas, a scenario is drawn and played .

This topic could be explained for hours in a seminar but I wanted to complete the topic with general information. Thank you #TheBAG

0
1.2K
Introduction to APIs: A Comprehensive Guide to Understanding Their Purpose and Applications

Introduction to APIs: A Comprehensive Guide to Understanding Their Pur...

defaultuser.png
X0NE
1 year ago
What is penetration testing?

What is penetration testing?

https://lh3.googleusercontent.com/a/ACg8ocIkM8EGIx0gz9GUP_nM6_sMxivr6876Wp0e9MAp6mGc=s96-c
xone
6 months ago

Black Box Testing

https://lh3.googleusercontent.com/a/ACg8ocIkM8EGIx0gz9GUP_nM6_sMxivr6876Wp0e9MAp6mGc=s96-c
xone
6 months ago
How Computer Viruses Operate

How Computer Viruses Operate

https://lh3.googleusercontent.com/a/ACg8ocIkM8EGIx0gz9GUP_nM6_sMxivr6876Wp0e9MAp6mGc=s96-c
xone
7 months ago
Make your python scripts accessible anywhere in your Linux terminal

Make your python scripts accessible anywhere in your Linux terminal

defaultuser.png
lazyhacker
1 year ago