Answer the question
In order to leave comments, you need to log in
How are VK pages hacked to order?
On one well-known forum, I found a topic from a famous person who passed the admins check.
Breaking pages to order. The cost of hacking is 3000 rubles. Do not break large pages.
Would like to know how they do it?
I don't have many options.
1. Brute force (I think it’s not relevant now)
2. Phishing and other social engineering (I think few people are doing it now)
3. A large network of rats / stealers / botnets and searching for the right page in the database
4. Own people in the social network employees. For example, a person who can quickly steal a session token from caches or databases in 5 minutes.
Option 4 is more likely, because paragraph
Do not break large pages.fits right in here. Because after that, hard kipish will go and everyone will get it.
Answer the question
In order to leave comments, you need to log in
> 2. Phishing and other social engineering (I think few people are doing now)
I suspect that people are much dumber. For example, I heard about such a feint with my ears: we find out the mail (if mail is attached to the site), we go to the page of the mail service (90% mailru or another large one), we ask you to recover the password, and there is a secret question like "mother's maiden name" or "pet's nickname ", the answer to which can either be searched in a dictionary or found in the victim's profile. If the answer is guessed / recognized, then the box is stolen first, then the page.
As for the two-factor by phone, then the connections in the opsos can "help" here. There were examples in the news when people "suddenly" turned off SMS for a couple of hours (then you can see it in detail), and at that time the page was hijacked through password recovery. Stories with the appearance of a clone of a SIM card somewhere in Vladivostok (for time zones, it is better for the victim to sleep and not immediately realize) are also googled enough.
1. Brute force (now I think it's not relevant)
2. Phishing and other social engineering (I think few people are doing it now)
3. A large network of rats / stealers / botnets and search for the desired page in the database
4. Own people in the employees of the social network.
Yes, corny someone from VK support can do this.
Therefore, large pages are not hacked, so as not to sleep at work.
But still, I don’t quite understand how all this is not controlled and covered up. W
Of course, phishing or social engineering is rubbed into trust by communication and then they trick out the password, codes, cookies, ask Skype to install and let the screen be controlled, blackmail with deceived data, etc.
There is another option to slip the application and get access to the data quite legally, if of course they are the owners of this application, read the article on the topic: https://m.habr.com/en/post/357474/
We have 15% of corporate employees whom we torture with educational passwords are leaked with the simplest phishing or an investment is launched, so that ordinary mothers will even more be led, they are being called from the bank security service, read the reports of FinCert of the Bank of Russia (there is about access to remote banking services, not to any social networks), and here they are being on something. And since they work to order, then thishttps://ru.m.wikipedia.org/wiki/APT , which means not phishing, but spear phishing on a topic that is applicable to the victim based on posts on the social network and other information on the contacts provided, well, not a social network, but a target social network
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question