Watch this hacker break into a company

CNN Business
2 Jun 201602:56

Summary

TLDRIn this video, ethical hackers David Kennedy and Josh Corman debunk the stereotypical image of hackers. Kennedy, a social engineer, demonstrates how he can manipulate individuals into revealing sensitive information, showcasing the power of social intelligence in hacking. He uses these techniques to help companies identify vulnerabilities. Meanwhile, Corman highlights the importance of using hacking skills responsibly, emphasizing the responsibility that comes with the power to protect against increasing cyber threats. Both hackers aim to bridge the gap between businesses and security, urging ethical hackers to play a pivotal role in safeguarding society.

Takeaways

  • 😀 A common misconception about hackers is that they are creepy individuals working in basements, but some hackers, like David Kennedy, are highly skilled social engineers with excellent social intelligence.
  • 😀 Social engineers, or 'people hackers,' specialize in manipulating people into revealing sensitive information or doing things they normally wouldn't.
  • 😀 David Kennedy, an expert social engineer, helps companies by demonstrating how easily employees can be tricked into compromising security.
  • 😀 In one demonstration, Kennedy spoofed his phone number to make it appear as if he was calling from within the company and tricked tech support into granting him access to their system.
  • 😀 By having the IT technician click on a malicious link, Kennedy was able to take control of his computer in under two minutes.
  • 😀 The IT technician, unaware of the risks, unknowingly granted Kennedy full access to the company's internal systems, illustrating how vulnerable organizations can be.
  • 😀 Companies hire ethical hackers like Kennedy to test their security systems by simulating attacks and identifying weaknesses in their defenses.
  • 😀 Josh Corman, another ethical hacker, emphasizes the need for responsibility when using hacking skills and advocates for a bridge between hackers and businesses to improve security.
  • 😀 Corman's philosophy is that with great power comes great responsibility, and it's crucial for hackers to use their skills for good, given the increasing frequency of security breaches.
  • 😀 Corman started a group to address the growing threat of cyberattacks and help companies better protect themselves from malicious hackers.
  • 😀 After the loss of his mother, Corman was inspired to contribute to a safer world, believing that it's our responsibility to address missing aspects of safety and security in society.

Q & A

  • What is the common misconception about hackers?

    -A common misconception about hackers is that they are creepy individuals working alone in dark basements. In reality, hacking can involve highly skilled professionals, many of whom are socially intelligent and work to improve security.

  • Who is David Kennedy and what is his role as a hacker?

    -David Kennedy is a social engineer, also known as a 'people hacker.' He uses his skills to manipulate situations and extract sensitive information, helping companies identify security vulnerabilities by testing if employees fall for social engineering attacks.

  • What is the main purpose of social engineering in cybersecurity?

    -The main purpose of social engineering in cybersecurity is to exploit human weaknesses rather than technical flaws. Social engineers trick individuals into revealing confidential information or performing actions that can compromise security.

  • How did David Kennedy demonstrate social engineering in the video?

    -David Kennedy demonstrated social engineering by spoofing his phone number to appear as though it was coming from within a company. He then called tech support, posing as an employee, and tricked them into granting him access to a system, exposing the company's vulnerability.

  • What was the outcome of David Kennedy’s social engineering attack in the demonstration?

    -The outcome was that David Kennedy successfully gained access to the IT technician’s computer within minutes, highlighting how easily an attacker could exploit human error and gain control over a company’s systems.

  • What role does social engineering play in cybersecurity testing?

    -Social engineering plays a crucial role in cybersecurity testing by simulating real-world attacks to identify weaknesses in how employees handle sensitive information. This helps companies improve security awareness and protocols.

  • Who is Josh Corman and what is his perspective on hacking?

    -Josh Corman is another ethical hacker who believes that hacking, when used responsibly, can protect society. He founded a group aimed at bridging the gap between hackers and companies and emphasizes the need for responsible use of hacking skills, especially in light of growing cybersecurity threats.

  • How did Josh Corman’s personal experience influence his work in cybersecurity?

    -Josh Corman’s personal experience, particularly the loss of his mother, influenced his work by motivating him to address gaps in the world. His mother’s teachings about filling those gaps inspired him to focus on the positive potential of hacking in protecting national security and personal data.

  • What is the significance of the phrase 'With great power comes great responsibility' in the context of hacking?

    -The phrase 'With great power comes great responsibility' underscores the ethical obligations of hackers. It highlights the idea that those with the power to access sensitive information must use their abilities to protect, rather than harm, society.

  • Why is it important for hackers to use their skills for good?

    -It is important for hackers to use their skills for good because cybersecurity breaches can have significant consequences on personal lives, businesses, and national security. Ethical hackers can help prevent these breaches by identifying vulnerabilities and strengthening systems.

Outlines

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Mindmap

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Keywords

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Highlights

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now

Transcripts

plate

This section is available to paid users only. Please upgrade to access this part.

Upgrade Now
Rate This

5.0 / 5 (0 votes)

Related Tags
HackingSocial EngineeringCybersecurityEthical HackingDavid KennedyJosh CormanTech SupportComputer SecurityPeople HackerSocial IntelligenceSecurity Breach