<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Engineering &#8211; AnonyViet &#8211; English Version</title>
	<atom:link href="https://en.anonyviet.com/tag/engineering/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.anonyviet.com</link>
	<description>The most popular website for sharing information technology, computer networks, and security knowledge. Stay up to date with the hottest news and tips</description>
	<lastBuildDate>Sun, 29 Jan 2023 14:06:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://en.anonyviet.com/wp-content/uploads/2023/01/cropped-ico-logo-75x75-1.png</url>
	<title>Engineering &#8211; AnonyViet &#8211; English Version</title>
	<link>https://en.anonyviet.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to hack icloud using Social Engineering method</title>
		<link>https://en.anonyviet.com/how-to-hack-icloud-using-social-engineering-method/</link>
					<comments>https://en.anonyviet.com/how-to-hack-icloud-using-social-engineering-method/#respond</comments>
		
		<dc:creator><![CDATA[AnonyViet]]></dc:creator>
		<pubDate>Sun, 29 Jan 2023 14:06:57 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Engineering]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[Method]]></category>
		<category><![CDATA[social]]></category>
		<guid isPermaLink="false">https://en.anonyviet.com/?p=6220</guid>

					<description><![CDATA[How to hack icloud using Social Engineering method Join the channel Telegram of the AnonyViet 👉 Link 👈 What is Social Engineering? Social Engineering is also known as Human Hacking. It is understood as the method of collecting information of the victim. In order to serve the purpose of attacking the account or system targeted [&#8230;]]]></description>
										<content:encoded><![CDATA[<p></p>
<div id="ftwp-postcontent">
<p style="text-align: center;"><span style="font-size: 18pt; color: #4285f4;">How to hack icloud using Social Engineering method</span></p>
<div class="code-block code-block-16" style="margin: 8px 0; clear: both;">
<div align="center">
<table class=" aligncenter" style="background-color: #c0c0c0; border-collapse: collapse; width: 59.9985%;">
<tbody>
<tr>
<td style="width: 100%; text-align: center;"><span style="font-size: 12pt;"><strong>Join the channel <span style="color: #0000ff;">Telegram</span> of the <span style="color: #008080;">AnonyViet </span> 👉 <span style="text-decoration: underline;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Ft.me%2Fanonyvietchat" class="local-link" rel="noopener">Link</a></span>  👈</strong></span></td>
</tr>
</tbody>
</table>
</div>
</div>
<h2 id="ftoc-social-engineering-la-gi" class="ftwp-heading"><span style="font-size: 14pt;"><strong><span style="color: #4285f4;">What is Social Engineering?</span></strong></span></h2>
<p>Social Engineering is also known as Human Hacking.  It is understood as the method of collecting information of the victim.  In order to serve the purpose of attacking the account or system targeted by the Hacker.  Here users will take advantage of available resources to serve the hacking process.  Like social relationships and tools available as well as online.  Use these tools to gather information.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-6869 size-full" src="https://anonyviet.com/wp-content/uploads/2017/11/chỉ-mục.png" alt="how to hack icloud with social engineering" width="238" height="212" title="Instructions to hack icloud using Social Engineering method 6"/></p>
<p>This can be seen as a skill to collect user information.  Purpose to act as a springboard to attack the system.</p>
<p>Note that social hacking is a hacking scheme designed to deceive the user&#8217;s mind.  You must really understand the purpose of the plan and know how to choose the right time.  It is best to have insiders or virus tracking like Keylogger or RAT assistant.  Be like a crocodile, know the right time to pounce on the bait<span class="text_exposed_show">n it cannot escape.</span></p>
<div class="text_exposed_show">
<p>The plan was devised and has been applied in credit scams in the US.  Social eneering is a series of steps that hit the victim&#8217;s psyche.  This method takes a lot of effort and time.  Should often be applied to the great purposes of black hat hackers.</p>
</div>
<p><span class=" UFICommentActorAndBody"><span data-ft="{&quot;tn&quot;:&quot;K&quot;}"><span class="UFICommentBody"> </span></span></span></p>
<h2 id="ftoc-icloud-la-gi" class="ftwp-heading"><span style="font-size: 14pt;"><strong><span style="color: #3366ff;">What is icloud?</span></strong></span></h2>
<p>If you use Apple devices such as Iphone, Ipad.  Will have to use Icloud to secure information for my phone.  Only someone who has an Icloud account can access the phone.  And Icloud will back up information about contacts, photos, configuration on your device.</p>
<p>Therefore, if you lose your Icloud account, it is likely that your phone will be compromised.  It may become a brick, if it is played badly by a hacker.</p>
<h2 id="ftoc-phuong-phap-social-engineering" class="ftwp-heading"><span style="font-size: 14pt;"><strong><span style="color: #4285f4;">Social Engineering Methods</span></strong></span></h2>
<p>I give an example of the current popular Social Engineering method.  Detail <span style="color: #ea4335;">Hack a bank account</span> through online money transfer.</p>
<p>First, the Hacker will learn the victim&#8217;s information.  Specific information about relationships in family, society, phone number, name, age.</p>
<p>When victim A is known, there is a relationship with a person named B. And person B is living abroad.  Hackers will attack and steal your account<span style="color: #ea4335;"> Facebook</span> of B then chat with A.</p>
<p>Nominally, the person who is abroad needs to transfer money to Vietnam via a bank account.  Hacker will entice victim A to access <span style="color: #ea4335;">Phishing website (fake interface)</span> of bank A. Phishing account and password to login.</p>
<p>Once the Hacker has an account to log in to online banking.  But the difficulty is to pass 2-step verification (verification via phone sms).  Using the Social Engineering method, the hacker will use B&#8217;s Facebook to Video Call A.</p>
<p>The purpose is to create trust this is indeed B. However <span style="color: #ea4335;">Webcam (Camera)</span> B&#8217;s (now a hacker) will intentionally leave it in the dark.  For the purpose of not showing A&#8217;s face.  Then ask A to read the sms code for B to confirm the deposit.  But if the face is not visible, the victim is easily suspicious.  Should be able to call the voice normally so that the victim does not suspect.</p>
<h2 id="ftoc-ket-luan" class="ftwp-heading"><span style="font-size: 14pt; color: #4285f4;">Conclusion</span></h2>
<p>Thus by the method <span style="color: #34a853;">call</span> <span style="color: #34a853;">direct electricity</span>, taking advantage of the victim&#8217;s trust.  Hacker has completely taken over A&#8217;s bank account. This is a good example of <span style="color: #ea4335;">Social Engineering</span> that hackers are using recently.  If you are looking to start Hacking then this article is a product that should not be missed.</p>
<p>You can see more articles: <a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fphan-tich-ve-viec-tai-khoan-vietcombank-bi-hack-500-trieu%2F" rel="dofollow noopener" class="local-link">Analysis of Vietcombank account being hacked 500 million VND</a> for a comprehensive overview of Social Engineering methodology.</p>
<h2 id="ftoc-cach-hack-icloud-bang-phuong-phap-social-engineering" class="ftwp-heading"><span style="color: #4285f4; font-size: 14pt;">How to hack icloud using Social Engineering method</span></h2>
<p>By the methods just analyzed and examples above.  Today I will guide you how to Hack Icloud using the method <span style="color: #34a853;">Social Engineering.</span> However, the victims are people who are not tech-savvy.  But pro like AnonyViet members are hard to beat.  Ahihi.</p>
<h2 id="ftoc-social-engineering" class="ftwp-heading"><span style="color: #ff0000;"><span style="font-size: 14pt; color: #ea4335;">Social Engineering</span><strong><br /></strong></span></h2>
<p>Currently there is little or no Tut to Hack Ilcoud.  So this will be the basic (basic) account hacking trick.  You can apply to friends or people around. (who are less knowledgeable about IT)</p>
<p><span style="color: #34a853;">Step 1:</span> You go to the forgot Apple account section.  Make sure you know the email in the victim&#8217;s account.  You can probe by checking gmail facebook.  Or find gmail through the victim&#8217;s online gaming accounts.</p>
<h3 id="ftoc-co-the-doc-qua-bai-nay" class="ftwp-heading"><span style="font-size: 14pt; color: #34a853;">You can read through this article</span></h3>
<p><a target="_blank" class="yoast-link-suggestion__value local-link" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fshare-tool-scan-mail-google-sll%2F" rel="dofollow noopener">Share Tool Scan Gmail Latest SLL</a></p>
<p><span style="color: #34a853;">Step 2:</span> It is important to know the exact date of birth of the victim.  Therefore, you should befriend the victim before attacking.  The suggestion is to create a <span style="color: #ea4335;">facebook acc</span> and chat with them.  Make sure that the date of birth information you have obtained is correct.  You have 12 attempts before you get locked out of your account being locked for 8 hours.  Tip: can suggest the victim to use <a target="_blank" href="https://en.anonyviet.com/next-link/?url=https%3A%2F%2Fask.fm%2F" rel="noopener external nofollow" class="ext-link" onclick="this.target='_blank';">https://ask.fm/</a> to answer anonymous questions.</p>
<p><span style="color: #34a853;">Step 3:</span> Passing the new security question is the 3rd obstacle. Please check the victim&#8217;s information and preferences via<span style="color: #ea4335;"> facebook, zalo, instagram.</span> Their security questions are often related to personal preferences or opinions.  You can also go back to step 2 once you&#8217;ve made friends to chat with them on facebook.  Can ask directly as an online friend.</p>
<p><span style="color: #34a853;">Step 4:</span> If you have done the above 3 steps correctly and perfectly.  You will receive a text message that the password has been changed.  The icloud hack here is successful.  The reason this method has the word <span style="color: #ea4335;">social (social). </span>It is because it is necessary to make use of social relationships and social networks a lot.</p>
<h3 id="ftoc-goi-y-them" class="ftwp-heading"><span style="font-size: 14pt; color: #34a853;">More suggestions</span></h3>
<p>You can download the recovery backup of Icloud iphone anywhere you want.  You can download their full backup and if you&#8217;re lucky.  Their icloud account will also link to<span style="color: #34a853;"> facebook, instagram, snapchat</span> and many other things.  You will have it all.</p>
<p>If you want DDOS to interrupt the victim&#8217;s transmission, leaving them without an internet connection to check their online banking account.  Please use <a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fshare-7-tool-ddos-cuc-manh-va-chat%2F" rel="noopener" class="local-link">this select 7 Tool DDOS toolkit</a>.</p>
<p>Like <a target="_blank" href="https://en.anonyviet.com/next-link/?url=http%3A%2F%2Ffacebook.com%2Fanonyvietdotcom%2F" rel="nofollow noopener external" class="ext-link" onclick="this.target='_blank';">Fanpage</a> to update the best and latest articles.</p>
<p style="text-align: right;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com" rel="noopener" class="local-link">AnonyViet</a> I wish you success<br /><span style="color: #34a853;">Lmint.</span></p>
<div class="kk-star-ratings kksr-auto kksr-align-right kksr-valign-bottom" data-payload="{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;6866&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;100&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;\u0110\u00e1nh gi\u00e1 b\u00e0i vi\u1ebft post&quot;,&quot;legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: 5\/5 - (100 b\u00ecnh ch\u1ecdn)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;width&quot;:&quot;142.5&quot;,&quot;_legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: {score}\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}">
<p>            The article achieved: 5/5 &#8211; (100 votes)    </p>
</p></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://en.anonyviet.com/how-to-hack-icloud-using-social-engineering-method/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://anonyviet.com/wp-content/uploads/2017/11/banner.png" medium="image"></media:content>
            	</item>
		<item>
		<title>Hack any system using Social Engineering – Part 2</title>
		<link>https://en.anonyviet.com/hack-any-system-using-social-engineering-part-2/</link>
					<comments>https://en.anonyviet.com/hack-any-system-using-social-engineering-part-2/#respond</comments>
		
		<dc:creator><![CDATA[AnonyViet]]></dc:creator>
		<pubDate>Sun, 29 Jan 2023 08:04:16 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Engineering]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Part]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[system]]></category>
		<guid isPermaLink="false">https://en.anonyviet.com/?p=6073</guid>

					<description><![CDATA[I introduced the basic concept of Social Engineering (SE) in Part 1. But that&#8217;s just an overview of it. We still have not gone deep to find out what it is, how it exists. I will explain more in this Part 2 from the most basic of the art of deception. Join the channel Telegram [&#8230;]]]></description>
										<content:encoded><![CDATA[<p></p>
<div id="ftwp-postcontent">
<p>I introduced the basic concept of Social Engineering (SE) in <a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fhack-social-engineering-p1%2F" rel="noopener" class="local-link">Part 1</a>.  But that&#8217;s just an overview of it.  We still have not gone deep to find out what it is, how it exists.  I will explain more in this Part 2 from the most basic of the art of deception.</p>
<div class="code-block code-block-16" style="margin: 8px 0; clear: both;">
<div align="center">
<table class=" aligncenter" style="background-color: #c0c0c0; border-collapse: collapse; width: 59.9985%;">
<tbody>
<tr>
<td style="width: 100%; text-align: center;"><span style="font-size: 12pt;"><strong>Join the channel <span style="color: #0000ff;">Telegram</span> of the <span style="color: #008080;">AnonyViet </span> 👉 <span style="text-decoration: underline;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Ft.me%2Fanonyvietchat" class="local-link" rel="noopener">Link</a></span>  👈</strong></span></td>
</tr>
</tbody>
</table>
</div>
</div>
<p style="text-align: center;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fhack-social-engineering-p1%2F" rel="noopener" class="local-link">Review part 1</a></p>
<p>Was <strong>cheat</strong> but i call it<strong> art</strong> because it has its own beauty.  But before you know it or where it is, you should know about its existence first.  Many young people ask me if Social Engineering is good or bad, so I would like to dedicate a part of this article to answer the above question.</p>
<h2 id="ftoc-social-engineering-la-tot-hay-xau" class="ftwp-heading">Social Engineering is good or bad?</h2>
<p>Most of us misunderstand the form of Social Engineering.  Does that lead to misconceptions about how Social Engineering works?  In fact, it always exists around us in many different forms and levels.</p>
<p>Social Engineering can be as simple as lying to distract someone in order to protect them.  Or can also be used to turn you into a criminal or a scammer.  Whether it is good or bad depends on the purpose of one&#8217;s use only !!</p>
<p>I&#8217;ve read a lot of research about this scam.  It has a lot to do with human psychology.  If you really grasp and understand the psychological circuit and combine it with Social Engineering, you are like a ghost.  Capable of brainwashing and manipulating anyone you want.</p>
<p>I created AnonyViet with the original purpose of preserving my knowledge.  But after a while, I want to share this source of knowledge with the community and hope to receive some support.  This series of articles is a collection of all my knowledge and research achievements on Social Engineering.</p>
<h2 id="ftoc-minh-day-ban-tro-thanh-ten-lua-dao-chuyen-nghiep" class="ftwp-heading">I teach you to be a professional scammer?</h2>
<p>Some people wonder why I&#8217;m going <strong>teach cheats</strong> for everyone?  The simple answer is that the literature is heavily researched in this area.  If I don&#8217;t share, people will find and learn!</p>
<p>Good society does not mean the <strong>bad guy</strong> will not be born.  An increasingly modern security system does not mean that Black Hat Hackers do not exist.  Moreover, the technology of cheating and deceiving on the internet is becoming more and more sophisticated.  Most of the victims were poisoned by Social Engineering.  Those who specialize in using Social Engineering fraud to do bad things are called <strong>Malicious Social Engineers.</strong></p>
<p><img decoding="async" class="aligncenter wp-image-10242 size-full" src="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-18-15.png" alt="Social Engineering" width="565" height="345" srcset="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-18-15.png 565w, https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-18-15-300x183.png 300w" sizes="(max-width: 565px) 100vw, 565px" title="Hack any system using Social Engineering – Part 2 8"/></p>
<p>Imagine, if I don&#8217;t provide more knowledge about Social Engineering?  How do you know and avoid being led by people and deceived.  After reading my series of articles, do you become a smart guy or a guy? <strong>Malicious Social Engineers</strong> It depends on your perception.</p>
<p>I wrote this series of articles with the purpose <strong>security education</strong> For most.  Knowledge is priceless but at AnonyViet it is free.  Please read, learn to know where you are lacking and improve.  I hope my knowledge will not make you worse, but will make you better and more sensitive in this troubled society.</p>
<h2 id="ftoc-tinh-trang-bao-mat-ngay-nay" class="ftwp-heading">Today&#8217;s Security Status</h2>
<p>Software companies are learning how to increase the security of their software.  Hackers are targeting people.  Instead of attacking the system&#8217;s security weaknesses, they prefer to take the easy route rather than attack the system&#8217;s administrator.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-10241 size-full" src="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-17-06.png" alt="Hackers with social engineering" width="526" height="348" srcset="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-17-06.png 526w, https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-17-06-300x198.png 300w" sizes="auto, (max-width: 526px) 100vw, 526px" title="Hack any system using Social Engineering – Part 2 9"/></p>
<p>Instead, it takes a hacker 100 hours to find a system vulnerability.  Then with the Social Engineering scam method, they don&#8217;t have to spend a lot of time and effort.  That&#8217;s why they say, no system is 100% secure!!</p>
<h2 id="ftoc-phan-loai-cac-dang-cua-social-engineering-se" class="ftwp-heading">Classification of types of Social Engineering (SE)</h2>
<p>As I said in the previous content, SE phishing techniques have many different forms.  There are dangerous forms, but there are also more friendly ones.  Before I teach you scam techniques, you should take some time to understand the different types of Social Engineering first.</p>
<h3 id="ftoc-hacker" class="ftwp-heading"><strong>Hackers</strong></h3>
<p>As noted above, today&#8217;s software is increasing security.  So Hackers also often use social engineering to gather information before hacking.  They often combine hardware hacking skills and SE scamming skills.</p>
<p>Usually, before the attacks, hackers often use the form of social engineering attacks to collect information first.  An example is the hacker group Anonymous.</p>
<h3 id="ftoc-penetration-testers" class="ftwp-heading"><strong>Penetration testers</strong></h3>
<p>As penetration testers, they know and understand the skills of a black hat hacker.  But do not use other people&#8217;s personal information to benefit themselves.  Instead, they often detect and help victims protect themselves.</p>
<h3 id="ftoc-spies" class="ftwp-heading"><strong>Spies</strong></h3>
<p>The spy class uses the Social Engineering scam as a life skill.  They are also experts in psychological attacks to steal information.  Often they are trained and work for mysterious organizations or military systems on the government side.</p>
<p>Currently, the information about the spy is still quite vague because it is very well hidden.  So I don&#8217;t have any specific examples that I can give you.  But I&#8217;m sure, the spies are very good at SE fraud skills to help them blend in and better hide their identities.</p>
<h3 id="ftoc-identity-thieves" class="ftwp-heading"><strong>Identity Thieves</strong></h3>
<p>Thieves intentionally use someone&#8217;s real information.  Such as name, bank account, address and identity card.  This thief is often called <strong>identity thief</strong> and of course they are good at many aspects of Social Engineering.  They often steal information and continue to use it to scam others.</p>
<p>The most typical example is the case of hacking Facebook password and then tricking the phone card of the victim&#8217;s friends.  There have been many cases where a lot of money was scammed and the victim became very miserable and miserable, but the thieves didn&#8217;t seem to mind.</p>
<h3 id="ftoc-disgruntled-employees" class="ftwp-heading"><strong> <span class="fontstyle0">Disgruntled employees</span></strong></h3>
<p>These bad guys often come from employees who are dissatisfied with their superiors but don&#8217;t say it.  Long-term repression leads to theft, vandalism or fraud for self-seeking and revenge against superiors.  This form of metamorphosis is rarely seen in Vietnam.</p>
<h3 id="ftoc-scam-artist" class="ftwp-heading"><strong>Scam artist</strong></h3>
<p>The nickname <strong>Scam artist</strong> enough for us to know how dangerous they are.  The main purpose of this class is to scam to make money and they usually make a lot of money.  These guys have a strong grasp of human psychology, even better than the <strong>Spies (spies)</strong> I said above.</p>
<p>These artists often poison and manipulate a few people, then learn to use those people to poison the minds of others.  Like the church of God is a type <strong>Scam artist</strong>.</p>
<h3 id="ftoc-so-luoc-kien-thuc" class="ftwp-heading">Knowledge summary</h3>
<p>So you&#8217;ve read through typical forms of Social Engineering in this section.  In addition to the above forms, they are also greatly metamorphosed and very diverse.  In Vietnam, multi-level status is also a skill that poisons the mind of Social Engineering.  The general purpose of all forms of Social Engineering is still to manipulate others to their will.</p>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-10240" src="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-15-04.png" alt="Social Engineering &#038; Hacking" width="482" height="313" srcset="https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-15-04.png 524w, https://anonyviet.com/wp-content/uploads/2018/07/05-07-2018-04-15-04-300x195.png 300w" sizes="auto, (max-width: 482px) 100vw, 482px" title="Hack any system using Social Engineering – Part 2 10"/></p>
<p>You have learned more about the basic forms of Social Engineering.  In Part 3 I will start talking about how to use Social Engineering as a weapon to manipulate others.  Along with that are the techniques that have never been revealed before.</p>
<p>If you&#8217;re interested in Social Engineering and want to learn more about it, stay tuned <a target="_blank" href="https://en.anonyviet.com/next-link/?url=http%3A%2F%2Ffacebook.com%2Fanonyvietdotcom" rel="noopener external nofollow" class="ext-link" onclick="this.target='_blank';">Fanpage</a> to or website <a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com" rel="noopener" class="local-link">AnonyViet.com</a> to watch the next part.</p>
<p style="text-align: right;">Thank you for your time &#038; AnonyViet.</p>
<div class="kk-star-ratings kksr-auto kksr-align-right kksr-valign-bottom" data-payload="{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;10237&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;100&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;\u0110\u00e1nh gi\u00e1 b\u00e0i vi\u1ebft post&quot;,&quot;legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: 5\/5 - (100 b\u00ecnh ch\u1ecdn)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;width&quot;:&quot;142.5&quot;,&quot;_legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: {score}\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}">
<p>            The article achieved: 5/5 &#8211; (100 votes)    </p>
</p></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://en.anonyviet.com/hack-any-system-using-social-engineering-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://anonyviet.com/wp-content/uploads/2018/07/abg.jpg" medium="image"></media:content>
            	</item>
		<item>
		<title>Hack any system using Social Engineering</title>
		<link>https://en.anonyviet.com/hack-any-system-using-social-engineering/</link>
					<comments>https://en.anonyviet.com/hack-any-system-using-social-engineering/#respond</comments>
		
		<dc:creator><![CDATA[AnonyViet]]></dc:creator>
		<pubDate>Sun, 29 Jan 2023 07:13:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Engineering]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[system]]></category>
		<guid isPermaLink="false">https://en.anonyviet.com/?p=6052</guid>

					<description><![CDATA[After social knowledge about Social Engineering and learning orientation in Part 3. In this section, I write about how to use Linux tools to collect information. This tool I mentioned at the end of part 3 is Basket. Join the channel Telegram of the AnonyViet 👉 Link 👈 REVIEW PART 3 This tool is classified [&#8230;]]]></description>
										<content:encoded><![CDATA[<p></p>
<div id="ftwp-postcontent">
<p>After social knowledge about Social Engineering and learning orientation in <a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fhack-social-engineering-p3%2F" rel="noopener" class="local-link">Part 3</a>.  In this section, I write about how to use Linux tools to collect information.  This tool I mentioned at the end of part 3 is <strong>Basket.</strong></p>
<div class="code-block code-block-16" style="margin: 8px 0; clear: both;">
<div align="center">
<table class=" aligncenter" style="background-color: #c0c0c0; border-collapse: collapse; width: 59.9985%;">
<tbody>
<tr>
<td style="width: 100%; text-align: center;"><span style="font-size: 12pt;"><strong>Join the channel <span style="color: #0000ff;">Telegram</span> of the <span style="color: #008080;">AnonyViet </span> 👉 <span style="text-decoration: underline;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Ft.me%2Fanonyvietchat" class="local-link" rel="noopener">Link</a></span>  👈</strong></span></td>
</tr>
</tbody>
</table>
</div>
</div>
<p style="text-align: center;"><a target="_blank" href="https://en.anonyviet.com/next-link?url=https%3A%2F%2Fanonyviet.com%2Fhack-social-engineering-p3%2F" rel="noopener" class="local-link">REVIEW PART 3</a></p>
<p>This tool is classified as antique on Linux.  Meaning it has been around for a long time (since 2010) but still exists today.  It doesn&#8217;t matter if the tool is new or old, it is important to exploit the victim&#8217;s information <strong>Okay</strong> nice <strong>are not</strong> ?</p>
<h2 id="ftoc-dung-basket-de-thu-thap-thong-tin-social-engineering" class="ftwp-heading">Use Basket to collect Social Engineering information</h2>
<p><strong>Basket</strong> has the same function as Notepad but much more expensive.  Developed by <strong>Kelvie Wong. </strong>You can view the source code of this Tool on Github <a target="_blank" href="https://en.anonyviet.com/next-link/?url=https%3A%2F%2Fgithub.com%2Fkelvie%2Fbasket" rel="noopener external nofollow" class="ext-link" onclick="this.target='_blank';">here</a>.  Linux is an open source operating system, so everything on Linux is free.</p>
<h3 id="ftoc-tai-basket-cho-linux" class="ftwp-heading" style="text-align: center;">Download Basket for Linux</h3>
<p>In addition to the function of editing and organizing information, Basket also has a very cool function!!  Wherever you are, read it slowly and you will see.  We will start from the most basic step in Basket!!</p>
<p>The image below is the user interface of Basket.</p>
<p><img decoding="async" class="size-full wp-image-10277 aligncenter" src="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-08-11.png" alt="Hack Any System Using Social Engineering - Part 4 4" width="664" height="456" srcset="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-08-11.png 664w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-08-11-300x206.png 300w" sizes="(max-width: 664px) 100vw, 664px" title="Hack Any System Using Social Engineering - Part 4 8"/></p>
<p>Click on the word <strong>Basket</strong> in the left corner, select <strong>New Basket</strong> to create a new basket.  You can copy and paste data or images in Basket with simple operation.  It&#8217;s like a Microsoft Word Mini on Linux!!!</p>
<p>We use Basket to sort and organize the data we find in the process of collecting information.  It is your planner, which can store and rearrange information in a logical order.  From there, you will easily draw a truly perfect plan.</p>
<h4 id="ftoc-them-anh-vao-basket" class="ftwp-heading">Add a photo to Basket</h4>
<p>What makes Basket interesting is the way it lists and displays data for us.  Every time you create <strong>New Basket</strong> you&#8217;ll get a new basket for your notes.  Baskets can be arranged into a Logical structure for easy viewing of information.</p>
<p><img decoding="async" loading="lazy" class="size-full wp-image-10278 aligncenter" src="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-19-14.png" alt="Hack Any System Using Social Engineering - Part 4 5" width="310" height="222" srcset="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-19-14.png 310w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-19-14-300x215.png 300w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-19-14-120x86.png 120w" sizes="auto, (max-width: 310px) 100vw, 310px" title="Hack Any System Using Social Engineering - Part 4 9"/></p>
<p>Just copy the photo, then press <strong>right mouse</strong> to the basket you want to add.  Select <strong>Paste</strong> to paste the image.  Besides images, you can write more personal notes like a regular editor.</p>
<p>I often create multiple baskets to note different types of information.  If the scale of the scam is large and valuable.  I usually use <strong>Google Maps</strong> or <strong>Google Earth</strong> to learn about and photograph the areas relevant to the victim.  Then use <strong>Basket</strong> logically arrange each area based on its safety, population density and topography.</p>
<h4 id="ftoc-tai-sao-google-earth-xin-hon-google-map" class="ftwp-heading">Why is Google Earth better than Google Map?</h4>
<p>If you want to collect image information from satellite like yourself.  You should use <strong>Google Earth</strong> instead of that crappy Google Map.  Because Google Earth is an exploration software that Google invests a lot and sells for $ 399.</p>
<p><strong>Google Earth</strong> connected to a real Google satellite outside the earth.  It will return live information at the time you watch it (just like Live-Stream).  In addition, it also supports many powerful satellite exploration features.  I already signed up <strong>Google Earth worth $399</strong> and you can download it for free if you want.</p>
<p style="text-align: center;">If you like Google Earth, you can download it at the link below</p>
<p>In addition to storing and organizing information <strong>Basket</strong> There are still many other useful features.  But because I haven&#8217;t used it yet, I can&#8217;t recommend it to you!!  See you one day, I will introduce the rest of the features.</p>
<h4 id="ftoc-ap-dung-vao-thuc-te-nhu-the-nao" class="ftwp-heading">How is it applied in practice?</h4>
<p>In the photo below, I use Basket to rearrange the information I have collected from a foreigner.  I have arranged them into a logical structure and easier to read and think about.  I try to separate out as many baskets as possible, each basket is a source of information.</p>
<p>What I put in Basket includes:</p>
<ul>
<li>Information about that person&#8217;s website.</li>
<li>Domain Whois Information (domain name).</li>
<li>The person&#8217;s social media accounts.</li>
<li>Some related pictures.</li>
<li>Contact information obtained from the company.</li>
<li>Forums that person has joined.</li>
<li>The relationships of that person that I find out.</li>
<li>A few pictures around the person&#8217;s workplace (Taken with Google Earth).</li>
</ul>
<p><img decoding="async" loading="lazy" class="aligncenter wp-image-10279 size-full" src="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-42-30.png" alt="Social Engineering - use Basket to collect information" width="993" height="572" srcset="https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-42-30.png 993w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-42-30-300x173.png 300w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-42-30-768x442.png 768w, https://anonyviet.com/wp-content/uploads/2018/07/08-07-2018-06-42-30-750x432.png 750w" sizes="auto, (max-width: 993px) 100vw, 993px" title="Hack any system using Social Engineering - Part 4 10"/></p>
<p>After rearranging the information in a logical order, everything becomes easier.  Look at the pile of information that I have arranged in the photo above.  Do you think it will be easier for us to make a plan!!</p>
<h4 id="ftoc-export-la-tinh-nang-minh-thich-nhat-o-basket" class="ftwp-heading">Export is my favorite feature in Basket</h4>
<p>After everything is done, I will click on the word <strong>Basket</strong> on the left corner.  Select function <strong>Export</strong> and output the data to an HTML web file.  Of course, everything in that website is also arranged in the same order that I did in <strong>Basket</strong>.</p>
<p>Now, I can upload this website to the host to share with you <strong>partners in crime</strong> your own reference.  After my team has finished discussing and planning a good meal, I will take down this website.</p>
<p>This is the first step to becoming a <strong>Social Engineer</strong>.  After this lesson, you need to know how to organize your data and plan.  You can send yourself the results after sorting and exporting the file to your HTML.</p>
<p style="text-align: center;">Contact me via Facebook<br /><a target="_blank" href="https://en.anonyviet.com/next-link/?url=https%3A%2F%2Fwww.facebook.com%2Fminhthong.lu.58" rel="noopener external nofollow" class="ext-link" onclick="this.target='_blank';">Facebook.com/minhthong.lu.58</a></p>
<p style="text-align: left;">If you do well, I would like to give you a scratch card of 30,000 VND for the first 5 friends as a reward for your study efforts.  In the next part, I will write about Dradis and how to use it to serve the Social Engineering Skill, stay tuned…</p>
<p style="text-align: center;"><iframe loading="lazy" width="500" height="511" style="border: none; overflow: hidden;" src="https://www.facebook.com/plugins/post.php?href=https%3A%2F%2Fwww.facebook.com%2Fanonyvietdotcom%2Fposts%2F2114243315500603&amp;width=500" scrolling="no" frameborder="0" allowtransparency="true" allow="encrypted-media"></iframe></p>
<h2 id="ftoc-noi-dung-phan-tiep-theo" class="ftwp-heading" style="text-align: center;">Contents of the next part</h2>
<p style="text-align: center;">How to use Dradis for Social Engineering.</p>
<p>If you liked this article, please leave a comment so that I can have a chance to communicate and explain difficulties to you!!!  Thank you very much for visiting AnonyViet Blog.</p>
<p style="text-align: right;">Good luck<br />Lmint.</p>
<div class="kk-star-ratings kksr-auto kksr-align-right kksr-valign-bottom" data-payload="{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;10275&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;105&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;\u0110\u00e1nh gi\u00e1 b\u00e0i vi\u1ebft post&quot;,&quot;legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: 5\/5 - (105 b\u00ecnh ch\u1ecdn)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;width&quot;:&quot;142.5&quot;,&quot;_legend&quot;:&quot;B\u00e0i vi\u1ebft \u0111\u1ea1t: {score}\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}">
<p>            The article achieved: 5/5 &#8211; (105 votes)    </p>
</p></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://en.anonyviet.com/hack-any-system-using-social-engineering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://anonyviet.com/wp-content/uploads/2018/07/09-1-2-780x405lc.png" medium="image"></media:content>
            	</item>
	</channel>
</rss>
