Page 58 - 31DEC2018E
P. 58

TECHNOLOGY




      New playground to trap                                                                                         collect huge information about the tar-  Hackers generally          $50..$100. Using two dots like this “..” will

                                                                                                                     get veterans before launching any direct
                                                                                                                                                                                         help you to find mobile prices ranging
                                                                                                                                                           use search engines
                                                                                                                     attack. Common people don’t know and
                                                                                                                                                                                         from 50 to 100 dollars only.
      soldiers for information                                                                                       even don’t have any faint idea of how a   in unique ways            tion where you may want to compare
                                                                                                                                                                                           Combining searches is another op-
                                                                                                                     hacker uses this skill for gathering pas-
                                                                                                                                                           to collect huge
                                                                                                                                                                                         between two closely related words like
                                                                                                                     sive information about any target. Refin-
                                                                                                                     ing web searches can be made easy with
                                                                                                                     the help of Google search. Hackers can   information                ‘army’ and ‘navy’. To narrow down your
                                                                                                                                                                                         chase write “OR” between these two
                                                                                                                     use symbols or words in their searches   about the target           words — army OR navy.
              low down a bit. There’s a trap   Army veterans are now being targeted on social media by hackers of    to make the search results more precise.                              By now you have probably known that
              somewhere along here. Us-                                                                                When  someone  uses  these  tech -  veterans before               extensions are generally used for domain
              ing subterfuge to gain entry   the ‘enemy’ countries, reports SANJIB SINHA                                                                   launching any                 specifications like “.gov” usually stands
              is not a new trick. It has been                                                                                                                                            for government sites. In such cases sim-
      S done before through various    ing them with misinformation, con -                                                                                 direct attack                 ply put “site:” before a site or domain like
      forms in the past. Now, the social media   spiracy theories, and other forms of junk                                                                                               this: ‘site:xyz.com’ or ‘site:.gov’, or ‘site:.
      is the new playground for trapping old   news about military affairs and national                                                                search the social media about a person   mil’.
      guys, especially army veterans who want  security issues. Recently the same thing                                                                or organization. In that case, one can   There are other sites that are related
      to connect to their former colleagues   happened in the US where through Fa-                                                                     place ‘@’ sign in front of a word to search    to one specific site and the hacker may
      through Facebook pages. The findings   cebook and Twitter, a broad network of                                                                    social media. If you want to get informa-  need to get results about them also. In
      and the report is mind boggling.   extremists has targeted the veterans the                                                                      tion about a veteran like “Sanjib Sinha” in  such cases, you can use the term “related”.
        Using this trick is super easy in a   same way. Researchers have found the                                                                     social media then just writing @sanjib-  Write “related:xyz.com”. Other sites asso-
      country like India which has recently   persistent interactions between current                                                                  sinha will give tons of information.  ciated with ‘xyz.com’ will automatically
      beaten countries like the US, UK and   and former military personnel and the                                                                       For social media, “hashtags” are popu-  fall prey to the hunting spree.
      China in the race of gaining the top post   impersonators hired by the foreign ene-                                                              lar to find out your favorite words that   Want more information and go deep
      on the chart of ‘Internet Addiction’. Now,   my country. In Facebook, the researchers                                                            are trending at present. In Google search,  into the details of any site? Just put “info:”
      82 percent of Indian Internet users can-  have experienced the same thing: there                                                                 you may write the word like this: #word.   in front of the site address like this —
      not live without the Internet as per the   are pages dedicated to the military and                                                                 Making the search more specific and   info:xyz.com.
      data collated by Statista, the survey was   veterans that have significant and per-                                                              pinpointed is a real challenge. To do that   Usually, Google keeps the cached
      conducted by IPSOS. Old and young alike,  sistent interactions with the subgroups                                                                one may need to omit few words. There   version  of  many  sites  those  do  not
      people are connected now; in countries   dedicated to the political conspiracy                                                                   are lots of words that have similarity and  exist anymore. You may want to check
      such as India, where the net-addiction   theories.                                                                                               it’s impossible for Google algorithm to   whether such cached versions exist or
      rate is so high, old people could easily fall   To the researchers’ astonishment, it                                                             make a differentiation between them.   not. Put “cache:” before the site address
      prey to the trap laid by the hackers hired  has been found that many subgroups                                                                   Suppose you want to know the speed   — cache:xyz.com or about someone like
      by the enemy country. They are lured to   spend quality time consuming the fake                                                                  of a tiger. Now there might be a brand   this — cache:sanjibsinha.
      the misinformation and junk news about  and junk news targeting the democracy                                                                    of car that has also been called ‘tiger’. In   Particularly in a country like India
      military affairs.                and the veterans suddenly begin to suf-                                                                         such cases, Google brings all the relevant  the challenge is immense. The low tech-
        Last year, an Oxford study revealed   fer from such wrong, misinformation.                                                                     measurement – the speed of the animal   literacy and ailing health can create vul-
      this truth first: military veterans are   It has also been found that the military                                                               alongside the speed of the car. If you   nerabilities for old veterans, in the US we
      ripe targets for such exploitation by en-  and the veterans are among the most                                                                   don’t want the speed of car then you can  saw in 2015 a massive OPM data-breach
      emy countries. Why they are targeted?                                                                                                            place ‘-’ before the word ‘car’. So finally   took place where the cyber-attack com-
      According to the report, veterans are                              sophisticated news consumers and as         niques, “Google Search” usually takes no   the search phrase will stand like this:    promised background check informa-
      more likely than the average person to   Veterans participate      they play the community roles effective-    notice of punctuation, which isn’t part of  ‘tiger speed –car’.     tion for nearly every soldier who had re-
      be community leaders and they partici-                             ly, it is easier to convince them with the   a search operator so better one omits it   You may want to search for an exact   ceived a security clearance since the Iraq
      pate in community culture more actively   in community culture     misinformation.                             in the very beginning. The hacker does   match of any word like ‘Sanjib Sinha   war began. In our country we need to be
      than average citizens; it is also true that   more actively than     While targeting the veterans enemy        not include spaces between the sym-  army infantry’. In that case, your search   aware of these facts and take suitable ac-
      their political opinions are momentous                             hackers do some kind of reconnaissance      bols or words and the search terms. In   must be double quoted: “Sanjib Sinha   tions if needed.
      determiner on those around them.    average citizens;              using search engine giants such as Goog-    the course of time, if one writes “site:xyz.  army infantry”.
        Sensing that, foreign powers, imper-                             le. And that is also not a very difficult task,   com”, then this will work. However, if any   You may want to search wildcards of   —The writer is an author and ethical
      sonating individuals and organisations,   their political          indeed. How do the hackers often use        space is given between them like this –   an unknown word with star sign “*” like   hacker. As a published author, Microsoft’s
      target the veterans and try to gain their   opinions are           Google for reconnaissance? For informa-     “site: xyz.com” then it will not work.  this: “Sanjib Sinha * air force”.  community contributor award winner,
      trust. What the hackers are doing now                              tion gathering anyone can use his simple      There  are  many  common  search   Sometimes searching within a range   Sanjib Sinha has written several books,
      is not a very advanced level of breach of   momentous              technique which sometimes could bear        techniques through Google search that   of numbers is necessary. Suppose you’re   including the best selling security book
      trust or spoofing; the method is simple:   determiner on           lots of fruits.                             can be used to gather passive informa-  looking for a mobile within price range   “Beginning Ethical Hacking with Python”
      gain the trust by impersonating organi-                              Though it seems trivial at first glance,   tion to gather information about the   50 and 100 dollars. In that case, you may           for Apress.
      zations that veterans rely on. Bombard-  those around them         hackers generally use search engines to     target. Suppose the hacker wants to   zero down your hunt this way: mobile           LETTERS@TEHELKA.COM



                                      TEHELKA / 31 DECEMBER 2018  58  WWW.TEHELKA.COM                                                                 TEHELKA / 31 DECEMBER 2018  59  WWW.TEHELKA.COM


   58-59 Sanjib Sinha.indd   2                                                                     12/14/2018   9:31:47 PM  58-59 Sanjib Sinha.indd   3                                                           12/14/2018   9:31:53 PM
   53   54   55   56   57   58   59   60   61   62   63