a hacker guide to sourcing talent in the 21 century (#sosude 2017)
TRANSCRIPT
Who is using it?
The Good
Social Engineers (yes, it’s a job)
Salesmen
Marketing
Sourcing/Recruitment
Candidates (guerrilla techniques)
Law enforcement
The Bad
Corporate espionage
Organized crime
Phishers/Vishers
Scammers
Hackers/Crackers
Phreakers
Script kiddies
Sourcing CVs on Googlejava OR J2EE intitle:cv OR intitle:resume OR intitle:vitae
filetype:pdf OR filetype:doc OR filetype:docx OR filetype:rtf
(payroll OR accountant OR ucetni) (german OR french) intitle:cv OR
intitle:resume OR intitle:vitae OR intitle:zivotopis filetype:pdf OR
filetype:doc OR filetype:docx OR filetype:rtf site:.cz OR site:.sk
How you can do it
SpoofCardwww.spoofcard.com
+ group spoofing+ background noises+ change your voice+ any mobile platform
bitphonewww.bitphone.net
+ pay by bitcoins+ encrypted communication+ call directly from your browser
X
Possible sourcing scenarios
Fake number is more effective than a hidden number
Calling a foreign candidate with a local number
Overcoming reception to reach a candidate at work by calling as e.g. an internal employee, branch number, etc.
Attract a candidate who will Google the unknown miscalled number back - e.g. from the CEO of some company (establishing engagement with a candidate)
and many other bad things: )
Why care?
Global Analysis
~ 500+ million LinkedIn users
~ 1,7 billion active Facebook users
~ 3,1 billion people online
~ 4,3 billion unique mobile phone subscribers
Source: Wiki, gsmamobileeconomy.com, internetworldstats.com
Why care?
Czech Republic breakdown
~ 10,5 million inhabitants
~ 1,1 million LinkedIn users
~ 4,7 million active Facebook users
~ 7,7 million people online
~ 14 million SIM cards
Possible sourcing scenarios
Approaching attendees of conferences, summits and meet-ups
Approaching employees of targeted companies
Engage with people passing by your company premises
Track habits, schedule and location of particular people/employees
Complete GSM stalking and hijack … ouch
Possible sourcing scenarios
Collecting contact information and identities at conferences and meet-ups
Sniffing traffic for more data about connected people
Individual Video Approach
Role: ECM Specialist at Tieto20 qualified candidates, LinkedIn response rate: 100%
“We are not going to white collar resort prison, no, no, no.We’re going to Federal POUND ME IN THE ^%*&^@ prison.”
-Office Space movie