State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks
Individuals and organizations have their private data disseminated in social networks systems and other open systems. Thus, attackers can explore published data in their (passive) information gathering phase to strengthen their attack. In this talk we analyze the privacy problem underlying social networks and the value they have to attackers. We will also present techniques used in impersonation attacks, and also show tools available for the active attack phase in a client-side pentesting.