Infiltration with Cyber ​​Identity

Dolyetyus

Özel Üye
21 Nis 2020
1,208
676
Delft
Cyber ​​identity is the first stage you will do in order to deceive individuals in the cyber space, to join groups and to get what you want. Your first impression is always important to gain people's trust and convince yourself. It can be much more difficult to make up for the mistakes you made at the beginning.

Cyber ​​identity is the basic principle of social engineering according to me.

Think of it like writing a novel. Like a story, like literature ... Those who read a lot will have an advantage at this point. Create a story character. However, it should be so well integrated into the story that no one will realize that there is actually a hidden spy in it. Like ordinary objects of your story ...


First of all, you have to set a name. For example, * "Ahmet, Mehmet, Ali, Ayşe, Fadime..." * these are the most used names in Turkey. Also on the last name "Yilmaz, Çelik" such as those in Turkey last names used most.

The province where your character lives in is important in the name selection. You can find the most common name in which province, below.

Link is broken, includes Turkish provinces and names.

Thus, if the other party searches for your real identity, they will find more records includes your name in the city and they will be confused.


It is up to you to choose where you are from. However, no one writes sentences in native accent. People from Trabzon (A province in Turkey) wouldn't say "Uiiiiiii, mine booiii" on the keyboard. Do not engage in this type of silly game.


Then, according to the event and situation, it should be selected according to the template below.

Name Lastname:
Hometown :
Place of residence:
Race :
Occupation:
Age :
Religion :
Political View: Central
Family : (Siblings, names of the father and the mother, their ages... )
Education and Schools He/She Fraduated:
Favorite Things : He'd Love to listening to Lil Pump (At least equals to Ajdar :D )
The things he hates and his obsessions : Symmetry
Physical Properties : Height 1.20 cm, red-eyed, 5 foots, elf....
Personality : Kinda unsocial, helpful, reads a lot, curious...


You can change this information according to the event. Do not compromise this information while communicating with the other party. If you have a subscription to a social network or website, fill in this information on all of your fake accounts and don't blunder while talking. There should be no conflicting information in your accounts.

If the other party asks for proof, you can send a fake ID. Or fake social network accounts. However, these may reveal falsehood in terms of appearance. For example, social network accounts may attract attention if they've just opened.

You can agree with a friend to make this character believable, but this is a last resort and should be used rarely. You can explain the situation and tell your friend that you need to talk to someone on his social network account, and you can persuade him/her to get his/her credentials and give it to the other party. You also choose the information from its information. In this case, the credibility will rise to 90%. Because the information belongs to someone who exists. But if you blunder, your chances of appearing also increase. The risk increases a bit, but the job gets easier.


Let's come to the other point, I am against the use of gender in this regard and I find it cruel. But even if I say don't use it, you will. In this case, putting your gender first in every conversation and environment will stand out. The credibility will decrease.

It should not be overdone. Your other information should not be at an extreme. On the contrary, it should be common with the target audience, it should remain ordinary so that it does not stand out. Boil and go.
The moment you start using your fake name and cyber identity, forget about who yourself is. Take on that identity. You are now "Ahmet, Mehmet, Ali, Ayşe". You ceased to be you. A new identity ...

While choosing all these, you can leave traces of your past. These are important elements that increase credibility. However, giving the collar one step closer.

For example, when choosing the city your character lives in, you can type in your real hometown or a city you know well before. If you are talking to someone who knows this city in the speeches, you will also keep up. However, if you don't know, this is a serious problem.

Or, you can write the places you know in the choice of profession and school, even if it is not yours,. You should be comfortable explaining. However, do not exaggerate leaving a trace from the past. Otherwise, you will make appear yourself again.

Psychological information is the most important, but that is exactly up to you. However it is very important to obey and stay loyal to that information. Since it is an abstract situation, I cannot handle it completely, but this identity ensures that you do not act unbalanced. If you are moody yesterday and if you are pessimistic today, people'd say what the heck , what happened in two days?


Finally, don't take anyone lightly. Set a plan even for a short time, draw your route, complete your story with the perfect plot. So much so that even when the story is over, you cannot be distinguished from the truth. :)




Source: https://www.turkhackteam.org/sosyal-muhendislik/1265992-siber-kimlik-ile-hedefe-sizma.html
Translator: Dolyetyus

 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.