Deceived art (preface 2)

xiaoxiao2021-04-04  278

In middle school, my most favorite prank is access to unauthorized access to the telephone switch and then changing the phone bill setting of a phone happel. When he called from his home, his phone will tell him to enter a coin, because the record of the telephone company switch is changed, thus thinking that he is tapping is a coinphone.

I have begun to pay attention to anything about the phone, not just electronics, switches and computers, and company organizations, business procedures and industry terms. Soon after, I better understand the telephone system than the employees of any telephone company. My application of social engineering has also reached a skilled stage. When I was 17 years old, I can talk about almost anything to most of the telecommunications company, whether it is a chat or call.

In fact, my more open hacker road began in secondary school. Although I can't say the Qingyuan Committee here, it can also be expressed in a word. In the early days of my hacking career, a driving force is accepting the people who are hacked. At that time, the word of hacker refers to a large number of people who spend hardware and software, or develop more efficient procedures, or bypass unnecessary steps to complete work. This word is now a meaning of "malicious violations" with derogatory, but in this book, I still use this vocabulary to understand it.

After the secondary school, I attacked a computer at the Los Angeles computer learning center. In a few months, the school's computer manager realized that I found the vulnerability of the operating system and achieved administrator privileges, but in the school's teaching staff, the best computer experts can't figure out how I am Do this. This may be one of the first example of hiring hackers. They gave me a proposal that could not be refused: either a graduation design of a honor degree to strengthen the school's computer security, or suspended the school due to hackers. Of course, I chose the former, graduated from a bachelor's honor with the best results.

Social engineer

Every morning, many people climbed from the bed and began to pay for thousands of people. I am very fortunate, because I like my job. You can't imagine the challenges, rewards and happiness as a secret investigator. My Niamens is known as social engineering (making people doing things that do not do things do for strangers in the usual situation) have been honered and returned.

For me, it is not difficult to become a social engineering. My father's family has a successful generation of sales, so the family has convinced and affected the family characteristics of others. When this feature is combined with the hobby of the lie, this is the basic outline of a social engineer. It can be said that there are two kinds of classifications of fraudulent art. One is to obtain money through fraud, deception to obtain money, this is the usual scammer. The other is to achieve the purpose of obtaining information, which is a social engineer. When I use tricks for free (I am still small, I don't realize that there is something wrong), I have gradually realized that I have an emptive secret that I have not expected. This is more strengthened by using tricks, understanding terms and cultivating good manipulation techniques. A method used to develop my professional skills (if this can be called a professional) method is to see if I can talk to people on the other end of the phone and get relevant information, even if this information is useless to me, this is just In order to prove my professional skills. Similarly, I also use this method to practice the wonderful plan, and I will find that I can get any information I want to pay attention to. As I have described in the Congress hearing after a few years, I described in the testimony of Lieberman and Tompson:

"I have not authorized to enter the world's largest computer computer system, and successfully penetrate some of the best computer systems. I use technology and non-technical means to obtain the source code of various operating systems and communication equipment, To study their vulnerabilities and work mechanisms. All these behaviors are to meet their own curiosity. See what they can do and discover the secrets, such as operating systems, mobile phones, and anything that can cause me Last idea

Since the arrest, I have admitted the illegal, infringed the secrets of others. My error behavior is caused by curiosity, I can't help but know how the telephone network is running, and understanding each detail of computer security. I am a hacker who is the most wrong, being scared by the government and businesses from a child who likes magic tricks. When I referred to the past 30 years, I admit that I have made an extremely poor choice, being driven by the desire of the learning technology and the vanity of the intellectual challenge.

But now I have changed, I am using my talent and information security, social engineering, to help government, enterprises, individuals to test, prevent and respond to information security. This book can introduce my experience to others to avoid the hazards that may have malicious information thieves. I believe that you will get fun, education and inspiration from this book.

转载请注明原文地址:https://www.9cbs.com/read-131724.html

New Post(0)