SlideShare a Scribd company logo
1 of 22
Misty

Stalking Unlimited Version 2
Overview
• Purpose of this exercise
• Application to exploit
  – Flaws in location searching when dealing with
    security and anonymity
• Recording clues and pressing farther
• Complete knowledge base of target
• Conclusion
Application to Exploit
Application to Exploit
Google also guilty…
Facebook profile?
Google search!
Link #1
linkedin.com Personal Page
Link #2
Pinterest.com Personal Page
Link #3
Her friend’s myspace.com account




              Female – Age 34
Link 4
Personal myspace.com account




      mmarlett78
Favorite Music Type
A maiden name search
Misty Marlett was born in 1978. Misty currently lives
in Killeen, Texas. Before that, she lived in Killeen, TX
  from 2009 to 2010. Before that, she lived in Lone
              Star, TX from 2001 to 2008.
A brief list of facts collected
•   Year of birth
•   Full name and maiden name
•   Current job and position
•   College attended
•   Degree attained
•   Favorite music type
•   Myspace account name
•   A list of probable friends
•   Several bits of personality
•   Approximation of current residence
•   List of past residences and time frames
•   When and where physical activity is done
Conclusion

• The more info you put out, the more accessible it is.
• Security is not the main concern in many applications
  or databases today
• Extremely sensitive information can be retrieved by
  doing very light “detective” work
• Never assume that anything in secure
• Information not directly disclosed can still be found

More Related Content

Similar to Misty

Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Marie Notcheva
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
Caivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint PresentationCaivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint Presentationroxanacaivano
 
Making Sense of Social Network Sites
Making Sense of Social Network SitesMaking Sense of Social Network Sites
Making Sense of Social Network SitesFred Stutzman
 
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...Robert Starks Jr
 
Smart social networking
Smart social networkingSmart social networking
Smart social networkingKim Grewe
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseGateHouseMedia
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskRyan Garcia
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Boundary Regulation in Social Media
Boundary Regulation in Social MediaBoundary Regulation in Social Media
Boundary Regulation in Social MediaFred Stutzman
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
Big Data for a Better World
Big Data for a Better WorldBig Data for a Better World
Big Data for a Better Worldleadinghands
 

Similar to Misty (20)

Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
Christians and The Internet: Being Aware; Being Equipped; and Being Good Witn...
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Researching Social Media
Researching Social MediaResearching Social Media
Researching Social Media
 
Caivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint PresentationCaivano Asst4 Facebook Powerpoint Presentation
Caivano Asst4 Facebook Powerpoint Presentation
 
Making Sense of Social Network Sites
Making Sense of Social Network SitesMaking Sense of Social Network Sites
Making Sense of Social Network Sites
 
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...
Robert starks-jr-does-your-career-center-speak-hashtag-career-services-traini...
 
Smart social networking
Smart social networkingSmart social networking
Smart social networking
 
Don't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouseDon't get fooled again: Best Practices for Online Verification gatehouse
Don't get fooled again: Best Practices for Online Verification gatehouse
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Seven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal RiskSeven Stories of Social Media Legal Risk
Seven Stories of Social Media Legal Risk
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Boundary Regulation in Social Media
Boundary Regulation in Social MediaBoundary Regulation in Social Media
Boundary Regulation in Social Media
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Social Media - Not Just for Marketing
Social Media - Not Just for MarketingSocial Media - Not Just for Marketing
Social Media - Not Just for Marketing
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Big Data for a Better World
Big Data for a Better WorldBig Data for a Better World
Big Data for a Better World
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Misty

Editor's Notes

  1. Its cool….and security perspective
  2. Its cool….and security perspective
  3. Hmm a friends link…
  4. Lets get some friends!
  5. I can search by CITY AND STATE?!
  6. A picture, and first name…
  7. A full name, city and state
  8. Where she runs, probably near her house…
  9. Hmm, nothing on myspace
  10. Oh god so many full links
  11. Where she works, the position in which she works
  12. Hobbies, favorite things to do, eat and drink
  13. AGE?!
  14. MAIDEN NAME?!