Meet with experts in the field of Internet security enough to give a lot of new knowledge. One of them, taught the most simple way to eavesdrop on other people’s email. Want to know how?
What is taught by Jose Grayda, Security Analyst of Security Operations Center at Symantec’s just for example – not to do evil – that turned out to be very easy to break into the email.
“The way it’s easy to break into an email, do not enter any viruses. The trick is simple and very basic. Just need the right scenario,” said the man from the Philippines this time of the demo in front of journalists from Asia Pacific and Japan, in Sydney, Australia.
One example is demonstrated, first, we must first determine who would be targeted. After making the scenario, we see the email account user habits.
It would be easier if he uses the public internet facilities such as public WiFi at airports and cafes. Because usually, people who use WiFi to go online will not be far away from the habit of checking Facebook, Twitter, email, chat, and the like.
Well, at the time they login, they will use the user ID and password that is most nearly the same for all accounts, be it for social media and email.
So how to retrieve data’s user ID and password? The first step, go through the address resolution protocol (ARP). Then, once the target device connected to the network before, immediately intercepted before through the Internet gateway.
“We can claim to be the gateway to the target, say the name Debbie, we can give the sender reply request. While the gateway, we can claim to be Debbie. So our position here is a man-in-the-middle, in the middle between the user and gateways, “said Jose.
“No hacking, because it’s just lying to both the machine, be it a laptop or a smartphone user, and Internet gateways only. They lied to just use spy tools alone. This is why many public WiFi insecure because we do not know what they were wearing security,” he explained more further.
Jose said, it’s just one simple example. How easy it is to collapse the internet simply by using the tools or software applications for this kind of activity.
Starting from just script kiddies until the hacktivist are organized there all. That is why, no wonder in the last year there were 4 trillion advanced persistent threats that threaten cyberspace. The amount of estimated to double as technology advances.