Yep, think that is refereed to as "social engineering" ?
They also used/use "dumpster diving" to get user names...

There was an infamous case years ago where a group of hackers said they could
get into the nerve center of one of the West Coast telco's. The telco told
them, yah, fat chance. Then the hackers told the press they had and the telco
said they were lying and then the hackers produced video tapes of them
strolling around inside this place... They were kids and had gotten everything
they needed from the telco's dumpsters !


Mike Naughton wrote:

> I remember reading that Kevin Mitnick (for a while one of the most-wanted
> hackers) said that the easiest way to gain entry to a system is simply to
> call up and ask for it (pretending, of course, to be someone who has a
> genuine need for it). Once he was in, he used his considerable computer
> skills to play around, but IIRC he claimed that he rarely had to use them
> to get in  in the first place. . . . .
> writes:
> >We get phone calls from people trying to spoof our security.
> >MIS errs on the side of caution ... WHO THE HELL ARE YOU & WHY DO YOU
> >
> >A receptionist type person is likely to err on the side of letting HACKERS
> >GET IN.
> >"I am manager at X site & I need security access for my new employees."
> >and
> >the receptionist person has no idea that the caller is in fact a person
> >with
> >no such authority.
> >
> > (Alister Wm Macintyre) (Al Mac)
> Mike Naughton
> Senior Programmer/Analyst
> Judd Wire, Inc.
> 124 Turnpike Road
> Turners Falls, MA  01376
> 413-863-4357 x444
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
> To post a message email:
> To subscribe, unsubscribe, or change list options,
> visit:
> or email:
> Before posting, please take a moment to review the archives
> at

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.