SlideShare a Scribd company logo
1 of 34
Download to read offline
Hack Back Series:
HowtospotfakeLinkedIn
profiles
AWaytofigureoutfalsesocialmedianetworkrequests.
By 404Whylo
27April,2015©2015www.404Whylo.com™Allrightsreserved.
1
Summary
27April,2015©2015www.404Whylo.com™Allrightsreserved.
2
• Hack back series is all about YOU and how I can contribute to
make the internet a safer place for everyone.
• LinkedIn Forensic for the standard user. I like to guide you
through a forensic approach to check for false profile pictures
and false profiles on LinkedIn .
• The techniques you learn will are essentials skills now and in
the future.
• More and more you will have to do this in the digital world
since attacks, scams and scum bags are upsizing their attack
intelligence.
• Protect yourself and become more diligent in the use of digital
media.
Howtospotfakeprofiles
• Based on the shear amount of fake profiles who try to invite
you to their LinkedIn network I decided to create this short
practical guide on how to spot fake profiles.
• In a previous article I wrote about the detection of a false
linked profile photos. You might read this one as well.
• http://www.slideshare.net/slideshare807am/hack-back-series-how-
to-spot-fake-pictures-a-way-to-figure-out-false-social-media-
network-requests-v02
• Based on a recent real life LinkedIn request I will show you
some tricks in spotting fake profiles very easily.
• Follow the steps and try it out yourself.
27April,2015©2015www.404Whylo.com™Allrightsreserved.
3
Theprofileoftherequest
• I got this LinkedIn
request just recently.
• First I read the profile and
decide weather this
request is somehow
phishy. I look at the
photo, the employer, work
experience and history
etc. All this gives me
indicators of legit or fake.
• First action I take is
always check for the
photo with Google or
TinEye.
4
©2015www.404Whylo.com™Allrightsreserved.27April,2015
First–thephotocheck(google)
• Right click on the
profile picture and
click on «Search
Google for this
image» or,
• You can use Tineye
for this too (will be
described later).
5
©2015www.404Whylo.com™Allrightsreserved.27April,2015
GoogleresultsI
27April,2015©2015www.404Whylo.com™Allrightsreserved.
6
As you can see the
picture is all over the
place (internet), the
exact same picture is
related to multiple
sources.
Pick some of the sites
go there to check
them out. Dive
deeper.
GoogleII–divingintoasite
27April,2015©2015www.404Whylo.com™Allrightsreserved.
7
It looks like the contact person works in advertising as well . Her
recent advertising campaign maybe works as a good conversation
starter. •www.allegromedical.com/attr-condition-Hemorrhoids.html
GoogleIII–divingintoasite
27April,2015©2015www.404Whylo.com™Allrightsreserved.
8
https://www.sccfcu.org/careers/
GoogleIV–divingintosites
27April,2015©2015www.404Whylo.com™Allrightsreserved.
9
contemporary-dental.com/
www.goodsource.com
shadeyladies.com
/testimonials
Picturesearch-conlclusion
• The picture search revealed:
• The profile picture is widely available on the internet. 
A legit person can be available widely too but would be related to one
name.
• The picture is associated with many unrelated sources and
names. A legit person would normally always be associated with
his name but maybe different with organisations and places.
• Conclusion: The profile picture of your contact request is
related to too many different persons and sources. This
makes it highly unlikely that this picture is real, rather it has
been snatched from one of the sites Google found. Most
often pictures get snatched from free picture sites like stock
photos.
10
©2015www.404Whylo.com™Allrightsreserved.27April,2015
First–thephotocheck(tineye)
• First go to the profile picture:
• Then right click on the profile
picture and select “Copy image
URL” After that open a new
browser window for
http://www.tineye.com/ There
you can paste the image URL in
the ENTER image Address box
and click search .
27April,2015©2015www.404Whylo.com™Allrightsreserved.
11Just to let you know I am in no way affiliated with http://www.tineye.com/ nor
do I get any incentives, endorsements etc. etc. It’s a tool and it’s free and it
works. It helps to protect you so just try it at your discretion.
TinEyeresults
27April,2015©2015www.404Whylo.com™Allrightsreserved.
12
As you can see the picture is
all over the place, the exact
same picture.
Conclusion: this cannot be a
picture of a real person
therefore you should not
connect with this person
TinEyeresults–sourcetracking
• TinEye offers the possibility to sort for the «oldest» picture.
• This is great for source attribution. Compare the date of the
LinkedIn profile creation to the date of the «oldest».
13
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Second–checkemployerI
• Second you should check the employer of the
person requesting to be your contact. So you
can see who your contact is working with and
who else eventually works at the same place.
• You can do this in two ways:
• Click on the current employer or
• Use google based on the company name
from the profile
14
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Second–checkemployerII
15
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Second–checkemployerIII
• Oh no one else
works there!
Must be hard
being an HR
Manager at a
company no
one works for.
16
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Second–checkemployerIV
• Google check.
Oh no!
• There is no
such company
to be found by
Google.
17
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Employersearch-conclusion
• If the person requesting your contact has no co-
workers this is suspicious. Especially if the person
requesting contact claims to be a senior executive
or manager or assuming a role of authority like
Police, Fire brigade, Military then the person must
work in a known company and will have co-
workers (connected to him or not).
• If the Company does not exists based on a search
with google I would be very wary about the
legitimacy of the provided credentials. 18
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Hm…
• These quick checks revealed enough to definitely
reveal this connection request as fake (profile
picture, employer etc.)
• Delete and forget!
• But I want to show you what more can be done if
you are uncertain about the legitimacy of a
profile or just plain curious ;-)
• Next step in LinkedIn Forensics…
19
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Theprofilecontent…
• Often content of fake profiles is shallow has next to no
recommendations and the employment history is short.
• Maybe only two or three employers. Senior professionals with
experience usually have more but the laziness of these profile
creators work to your advantage.
• Experimental Forensic: analysing the content can be also very
insightful. You can do this with professional tools or just with
Google.
• Google works fine and fast for some quick content checking.
• The plan is to check for some of the profile content to see if it
has been plagiarised or copied from somewhere else.
20
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Theprofilecontent–checkI
• I took parts (blue
marked) of the
description from the
profile of the person
requesting your contact.
• I feed that text snippet
into Google and just hit
search…
• Experiment with less or
more text in order to get
different/ better results.
21
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Theprofilecontent–resultI
• Surprise, surprise I
landed some hits!
• One person had
multiple hits.
• Next I went to this
persons LinkedIn
profile to see what
the hits where about.
22
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Masked for privacy
Masked for privacy
Masked for privacy
Theprofilecontent–compareI
• The two profiles summaries side by side
23
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Assumed fake Assumed legit
Masked for privacy
Theprofilecontent–firstresult
• Obviously the content has entirely being copied
over from an appearing legit LinkedIn user.
• 1:1 copy thank you, laziness has prevailed.
• Now think about what will happen if the fake
profile builders aren't that lazy anymore?
• Now I got curious even more. Could there be
more?
• I did more content search starting form the
assumed fake profile.
24
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Theprofilecontent–checkII
• I took parts (blue
marked) of the
description from the
profile of the person
requesting your
contact.
• I feed that text snippet
into Google and just
hit search…
• Experiment with less
or more text in order to
get different results. 25
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Theprofilecontent–resultII
• Surprise, surprise I
landed some hits!
• One person had
multiple hits.
• Next I went to this
persons LinkedIn
profile to see what
the hits where about.
26
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Masked for privacy
Masked for privacy
Masked for privacy
Theprofilecontent–compareII
• The two profiles summaries side by side
27
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Assumed fake Assumed legit (second person)
Theprofilecontent–2ndresult
• Obviously the content has entirely being copied
over from an appearing legit LinkedIn user.
• 1:1 copy thank you, laziness has prevailed.
• Now think about what will happen if the fake
profile builder aren't that lazy anymore?
• Now I got curious even more. Could there be
more?
• I did more content search form the assumed fake
profile.
28
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Diggingintosecondperson
• The fake profile requestor copied content
from two different profiles and uses a fake
profile picture.
• Something on the profile of the second
person our contact requestor copied from
made me suspicious.
• So I did what I already explained to you.
• Using Google to check for copied content.
• …
29
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Inputfromsecondperson
• Here the text snippet I took
form the second person our
original scammer took
information from.
• That person presented
himself working from Sept.
2003 to March 2014 for
Network Rail in
Manchester.
• So far so good
• Exactly take text put into
google and see…
30
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Resultfromsecondperson
• In a job ad from
railwaypeople.com I found
the exact same text.
• Now what does this mean?
• There is no coincidence.
• My gut tells me this is a glitch
from a young professional
wanting his LinkedIn profile
look professional.
• So he copied some text over
in order to pimp his profile.
• Good he is not into security
otherwise this could lead to
questions later (depending on
his future employer). 31
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Case
32
©2015www.404Whylo.com™Allrightsreserved.27April,2015
A
BQ C
D
1. (A) Stole:
1. Profile picture (Q)
2. Job Summary from (B)
3. Job description content from (C)
1. C stole Job description content from (D)
Summary
• Be very vary who you connect with.
• Hone your skills in detecting fake or
fraudulent credentials, skills and
profiles.
• Be always diligent.
• If you have the slightest doubt then
don’t connect. 33
©2015www.404Whylo.com™Allrightsreserved.27April,2015
Thanksanddon’t
forget tohave
fun!
27April,2015©2015www.404Whylo.com™Allrightsreserved.
34

More Related Content

Viewers also liked

Проверка ссылок с Marilyn
Проверка ссылок с MarilynПроверка ссылок с Marilyn
Проверка ссылок с MarilynMarilyn
 
Management wisdom series leader and team
Management wisdom series  leader and teamManagement wisdom series  leader and team
Management wisdom series leader and teamReputelligence
 
trai hư với gái ngoan
trai hư với gái ngoantrai hư với gái ngoan
trai hư với gái ngoanhuyen nguyen
 
з досвіду роботи вчителя логопеда павлишин в.в.
з досвіду роботи вчителя логопеда павлишин в.в.з досвіду роботи вчителя логопеда павлишин в.в.
з досвіду роботи вчителя логопеда павлишин в.в.bytunu
 
Difference b/w 8085 & 8086
Difference b/w 8085 & 8086Difference b/w 8085 & 8086
Difference b/w 8085 & 8086j4jiet
 
Google Analytics & Seo @seosixt wiesn 2014
Google Analytics & Seo @seosixt wiesn 2014Google Analytics & Seo @seosixt wiesn 2014
Google Analytics & Seo @seosixt wiesn 2014121WATT GmbH
 

Viewers also liked (10)

Проверка ссылок с Marilyn
Проверка ссылок с MarilynПроверка ссылок с Marilyn
Проверка ссылок с Marilyn
 
Management wisdom series leader and team
Management wisdom series  leader and teamManagement wisdom series  leader and team
Management wisdom series leader and team
 
RavinderRai
RavinderRaiRavinderRai
RavinderRai
 
trai hư với gái ngoan
trai hư với gái ngoantrai hư với gái ngoan
trai hư với gái ngoan
 
з досвіду роботи вчителя логопеда павлишин в.в.
з досвіду роботи вчителя логопеда павлишин в.в.з досвіду роботи вчителя логопеда павлишин в.в.
з досвіду роботи вчителя логопеда павлишин в.в.
 
How Safe is Food?
How Safe is Food?How Safe is Food?
How Safe is Food?
 
Difference b/w 8085 & 8086
Difference b/w 8085 & 8086Difference b/w 8085 & 8086
Difference b/w 8085 & 8086
 
Google Analytics & Seo @seosixt wiesn 2014
Google Analytics & Seo @seosixt wiesn 2014Google Analytics & Seo @seosixt wiesn 2014
Google Analytics & Seo @seosixt wiesn 2014
 
Libro 3
Libro 3Libro 3
Libro 3
 
Application form
Application formApplication form
Application form
 

Similar to Hack back series how to spot fake linked in profiles - a way to figure out false social media network requests v0.2

Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1Reputelligence
 
Latest copy impacting business performance with analytics
Latest copy impacting business performance with analytics   Latest copy impacting business performance with analytics
Latest copy impacting business performance with analytics iLive Conference
 
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...The RSW/US Thought Leader Survey-Where social fits into your agency new busin...
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...RSW/US
 
Impacting Business Performance with Analytics
Impacting Business Performance with AnalyticsImpacting Business Performance with Analytics
Impacting Business Performance with AnalyticsPeter O'Neill
 
Analytics Workshop - Impacting Business Performance
Analytics Workshop - Impacting Business PerformanceAnalytics Workshop - Impacting Business Performance
Analytics Workshop - Impacting Business PerformanceOutreach Digital
 
Social media for the job search
Social media for the job searchSocial media for the job search
Social media for the job searchBen Thomas
 
14 Ways to Be a Better Digital Marketer in 2014
14 Ways to Be a Better Digital Marketer in 201414 Ways to Be a Better Digital Marketer in 2014
14 Ways to Be a Better Digital Marketer in 2014David Griner
 
Beginner's Twitter Guide
Beginner's Twitter GuideBeginner's Twitter Guide
Beginner's Twitter GuideAndrew Swinney
 
Getting Started On Twitter Guide
Getting Started On Twitter GuideGetting Started On Twitter Guide
Getting Started On Twitter GuideKasasa
 
No Nonsense Content Marketing - MNsearch 2017 - Slideshare
No Nonsense Content Marketing - MNsearch 2017 - SlideshareNo Nonsense Content Marketing - MNsearch 2017 - Slideshare
No Nonsense Content Marketing - MNsearch 2017 - SlideshareJohn Doherty
 
4 Steps to Making Your Blog Work Better for You
4 Steps to Making Your Blog Work Better for You4 Steps to Making Your Blog Work Better for You
4 Steps to Making Your Blog Work Better for YouVictoria Edwards
 
EE Social Media Advanced Presentation
EE Social Media Advanced PresentationEE Social Media Advanced Presentation
EE Social Media Advanced PresentationSandy Ratliff
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for BusinessCarla Yashiro
 
Marketing, Taxes, Media - Michael Libbie
Marketing, Taxes, Media - Michael LibbieMarketing, Taxes, Media - Michael Libbie
Marketing, Taxes, Media - Michael LibbieTom Henricksen
 
Building your online professional profile
Building your online professional profileBuilding your online professional profile
Building your online professional profileLisa Harris
 
Social Media Basics I & II - Arkansas Society of CPAs Presentation
Social Media Basics I & II - Arkansas Society of CPAs PresentationSocial Media Basics I & II - Arkansas Society of CPAs Presentation
Social Media Basics I & II - Arkansas Society of CPAs PresentationAbbi Siler
 
Digital Trends - October 2016
Digital Trends - October 2016Digital Trends - October 2016
Digital Trends - October 2016Schbang
 
How to fly w/Twitter
How to fly w/TwitterHow to fly w/Twitter
How to fly w/TwitterMichelle Holt
 

Similar to Hack back series how to spot fake linked in profiles - a way to figure out false social media network requests v0.2 (20)

Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 
Latest copy impacting business performance with analytics
Latest copy impacting business performance with analytics   Latest copy impacting business performance with analytics
Latest copy impacting business performance with analytics
 
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...The RSW/US Thought Leader Survey-Where social fits into your agency new busin...
The RSW/US Thought Leader Survey-Where social fits into your agency new busin...
 
Impacting Business Performance with Analytics
Impacting Business Performance with AnalyticsImpacting Business Performance with Analytics
Impacting Business Performance with Analytics
 
Analytics Workshop - Impacting Business Performance
Analytics Workshop - Impacting Business PerformanceAnalytics Workshop - Impacting Business Performance
Analytics Workshop - Impacting Business Performance
 
Social media for the job search
Social media for the job searchSocial media for the job search
Social media for the job search
 
14 Ways to Be a Better Digital Marketer in 2014
14 Ways to Be a Better Digital Marketer in 201414 Ways to Be a Better Digital Marketer in 2014
14 Ways to Be a Better Digital Marketer in 2014
 
Beginner's Twitter Guide
Beginner's Twitter GuideBeginner's Twitter Guide
Beginner's Twitter Guide
 
Getting Started On Twitter Guide
Getting Started On Twitter GuideGetting Started On Twitter Guide
Getting Started On Twitter Guide
 
No Nonsense Content Marketing - MNsearch 2017 - Slideshare
No Nonsense Content Marketing - MNsearch 2017 - SlideshareNo Nonsense Content Marketing - MNsearch 2017 - Slideshare
No Nonsense Content Marketing - MNsearch 2017 - Slideshare
 
4 Steps to Making Your Blog Work Better for You
4 Steps to Making Your Blog Work Better for You4 Steps to Making Your Blog Work Better for You
4 Steps to Making Your Blog Work Better for You
 
CT Signature PP
CT Signature PPCT Signature PP
CT Signature PP
 
EE Social Media Advanced Presentation
EE Social Media Advanced PresentationEE Social Media Advanced Presentation
EE Social Media Advanced Presentation
 
Twitter for Business
Twitter for BusinessTwitter for Business
Twitter for Business
 
Marketing, Taxes, Media - Michael Libbie
Marketing, Taxes, Media - Michael LibbieMarketing, Taxes, Media - Michael Libbie
Marketing, Taxes, Media - Michael Libbie
 
Building your online professional profile
Building your online professional profileBuilding your online professional profile
Building your online professional profile
 
Social Media Basics I & II - Arkansas Society of CPAs Presentation
Social Media Basics I & II - Arkansas Society of CPAs PresentationSocial Media Basics I & II - Arkansas Society of CPAs Presentation
Social Media Basics I & II - Arkansas Society of CPAs Presentation
 
Digital Trends - October 2016
Digital Trends - October 2016Digital Trends - October 2016
Digital Trends - October 2016
 
Twitter tornado
Twitter tornadoTwitter tornado
Twitter tornado
 
How to fly w/Twitter
How to fly w/TwitterHow to fly w/Twitter
How to fly w/Twitter
 

More from Reputelligence

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.deReputelligence
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...Reputelligence
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessReputelligence
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementReputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationReputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbReputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)Reputelligence
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutReputelligence
 

More from Reputelligence (20)

Sicherheit welche gefahren durch drohnen drohen golem.de
Sicherheit  welche gefahren durch drohnen drohen   golem.deSicherheit  welche gefahren durch drohnen drohen   golem.de
Sicherheit welche gefahren durch drohnen drohen golem.de
 
Intensity levels social engineering engagement framework (seef) first cut d...
Intensity levels social engineering engagement framework (seef)   first cut d...Intensity levels social engineering engagement framework (seef)   first cut d...
Intensity levels social engineering engagement framework (seef) first cut d...
 
Artikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup ProcessArtikel About Drones and Swisscom Innovation Startup Process
Artikel About Drones and Swisscom Innovation Startup Process
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 

Recently uploaded

Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecSapana Sha
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 

Recently uploaded (20)

Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts ServiecCall Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
Call Girls In Noida Mall Of Noida O9654467111 Escorts Serviec
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 

Hack back series how to spot fake linked in profiles - a way to figure out false social media network requests v0.2

  • 1. Hack Back Series: HowtospotfakeLinkedIn profiles AWaytofigureoutfalsesocialmedianetworkrequests. By 404Whylo 27April,2015©2015www.404Whylo.com™Allrightsreserved. 1
  • 2. Summary 27April,2015©2015www.404Whylo.com™Allrightsreserved. 2 • Hack back series is all about YOU and how I can contribute to make the internet a safer place for everyone. • LinkedIn Forensic for the standard user. I like to guide you through a forensic approach to check for false profile pictures and false profiles on LinkedIn . • The techniques you learn will are essentials skills now and in the future. • More and more you will have to do this in the digital world since attacks, scams and scum bags are upsizing their attack intelligence. • Protect yourself and become more diligent in the use of digital media.
  • 3. Howtospotfakeprofiles • Based on the shear amount of fake profiles who try to invite you to their LinkedIn network I decided to create this short practical guide on how to spot fake profiles. • In a previous article I wrote about the detection of a false linked profile photos. You might read this one as well. • http://www.slideshare.net/slideshare807am/hack-back-series-how- to-spot-fake-pictures-a-way-to-figure-out-false-social-media- network-requests-v02 • Based on a recent real life LinkedIn request I will show you some tricks in spotting fake profiles very easily. • Follow the steps and try it out yourself. 27April,2015©2015www.404Whylo.com™Allrightsreserved. 3
  • 4. Theprofileoftherequest • I got this LinkedIn request just recently. • First I read the profile and decide weather this request is somehow phishy. I look at the photo, the employer, work experience and history etc. All this gives me indicators of legit or fake. • First action I take is always check for the photo with Google or TinEye. 4 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 5. First–thephotocheck(google) • Right click on the profile picture and click on «Search Google for this image» or, • You can use Tineye for this too (will be described later). 5 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 6. GoogleresultsI 27April,2015©2015www.404Whylo.com™Allrightsreserved. 6 As you can see the picture is all over the place (internet), the exact same picture is related to multiple sources. Pick some of the sites go there to check them out. Dive deeper.
  • 7. GoogleII–divingintoasite 27April,2015©2015www.404Whylo.com™Allrightsreserved. 7 It looks like the contact person works in advertising as well . Her recent advertising campaign maybe works as a good conversation starter. •www.allegromedical.com/attr-condition-Hemorrhoids.html
  • 10. Picturesearch-conlclusion • The picture search revealed: • The profile picture is widely available on the internet.  A legit person can be available widely too but would be related to one name. • The picture is associated with many unrelated sources and names. A legit person would normally always be associated with his name but maybe different with organisations and places. • Conclusion: The profile picture of your contact request is related to too many different persons and sources. This makes it highly unlikely that this picture is real, rather it has been snatched from one of the sites Google found. Most often pictures get snatched from free picture sites like stock photos. 10 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 11. First–thephotocheck(tineye) • First go to the profile picture: • Then right click on the profile picture and select “Copy image URL” After that open a new browser window for http://www.tineye.com/ There you can paste the image URL in the ENTER image Address box and click search . 27April,2015©2015www.404Whylo.com™Allrightsreserved. 11Just to let you know I am in no way affiliated with http://www.tineye.com/ nor do I get any incentives, endorsements etc. etc. It’s a tool and it’s free and it works. It helps to protect you so just try it at your discretion.
  • 12. TinEyeresults 27April,2015©2015www.404Whylo.com™Allrightsreserved. 12 As you can see the picture is all over the place, the exact same picture. Conclusion: this cannot be a picture of a real person therefore you should not connect with this person
  • 13. TinEyeresults–sourcetracking • TinEye offers the possibility to sort for the «oldest» picture. • This is great for source attribution. Compare the date of the LinkedIn profile creation to the date of the «oldest». 13 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 14. Second–checkemployerI • Second you should check the employer of the person requesting to be your contact. So you can see who your contact is working with and who else eventually works at the same place. • You can do this in two ways: • Click on the current employer or • Use google based on the company name from the profile 14 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 16. Second–checkemployerIII • Oh no one else works there! Must be hard being an HR Manager at a company no one works for. 16 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 17. Second–checkemployerIV • Google check. Oh no! • There is no such company to be found by Google. 17 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 18. Employersearch-conclusion • If the person requesting your contact has no co- workers this is suspicious. Especially if the person requesting contact claims to be a senior executive or manager or assuming a role of authority like Police, Fire brigade, Military then the person must work in a known company and will have co- workers (connected to him or not). • If the Company does not exists based on a search with google I would be very wary about the legitimacy of the provided credentials. 18 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 19. Hm… • These quick checks revealed enough to definitely reveal this connection request as fake (profile picture, employer etc.) • Delete and forget! • But I want to show you what more can be done if you are uncertain about the legitimacy of a profile or just plain curious ;-) • Next step in LinkedIn Forensics… 19 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 20. Theprofilecontent… • Often content of fake profiles is shallow has next to no recommendations and the employment history is short. • Maybe only two or three employers. Senior professionals with experience usually have more but the laziness of these profile creators work to your advantage. • Experimental Forensic: analysing the content can be also very insightful. You can do this with professional tools or just with Google. • Google works fine and fast for some quick content checking. • The plan is to check for some of the profile content to see if it has been plagiarised or copied from somewhere else. 20 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 21. Theprofilecontent–checkI • I took parts (blue marked) of the description from the profile of the person requesting your contact. • I feed that text snippet into Google and just hit search… • Experiment with less or more text in order to get different/ better results. 21 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 22. Theprofilecontent–resultI • Surprise, surprise I landed some hits! • One person had multiple hits. • Next I went to this persons LinkedIn profile to see what the hits where about. 22 ©2015www.404Whylo.com™Allrightsreserved.27April,2015 Masked for privacy Masked for privacy Masked for privacy
  • 23. Theprofilecontent–compareI • The two profiles summaries side by side 23 ©2015www.404Whylo.com™Allrightsreserved.27April,2015 Assumed fake Assumed legit Masked for privacy
  • 24. Theprofilecontent–firstresult • Obviously the content has entirely being copied over from an appearing legit LinkedIn user. • 1:1 copy thank you, laziness has prevailed. • Now think about what will happen if the fake profile builders aren't that lazy anymore? • Now I got curious even more. Could there be more? • I did more content search starting form the assumed fake profile. 24 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 25. Theprofilecontent–checkII • I took parts (blue marked) of the description from the profile of the person requesting your contact. • I feed that text snippet into Google and just hit search… • Experiment with less or more text in order to get different results. 25 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 26. Theprofilecontent–resultII • Surprise, surprise I landed some hits! • One person had multiple hits. • Next I went to this persons LinkedIn profile to see what the hits where about. 26 ©2015www.404Whylo.com™Allrightsreserved.27April,2015 Masked for privacy Masked for privacy Masked for privacy
  • 27. Theprofilecontent–compareII • The two profiles summaries side by side 27 ©2015www.404Whylo.com™Allrightsreserved.27April,2015 Assumed fake Assumed legit (second person)
  • 28. Theprofilecontent–2ndresult • Obviously the content has entirely being copied over from an appearing legit LinkedIn user. • 1:1 copy thank you, laziness has prevailed. • Now think about what will happen if the fake profile builder aren't that lazy anymore? • Now I got curious even more. Could there be more? • I did more content search form the assumed fake profile. 28 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 29. Diggingintosecondperson • The fake profile requestor copied content from two different profiles and uses a fake profile picture. • Something on the profile of the second person our contact requestor copied from made me suspicious. • So I did what I already explained to you. • Using Google to check for copied content. • … 29 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 30. Inputfromsecondperson • Here the text snippet I took form the second person our original scammer took information from. • That person presented himself working from Sept. 2003 to March 2014 for Network Rail in Manchester. • So far so good • Exactly take text put into google and see… 30 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 31. Resultfromsecondperson • In a job ad from railwaypeople.com I found the exact same text. • Now what does this mean? • There is no coincidence. • My gut tells me this is a glitch from a young professional wanting his LinkedIn profile look professional. • So he copied some text over in order to pimp his profile. • Good he is not into security otherwise this could lead to questions later (depending on his future employer). 31 ©2015www.404Whylo.com™Allrightsreserved.27April,2015
  • 32. Case 32 ©2015www.404Whylo.com™Allrightsreserved.27April,2015 A BQ C D 1. (A) Stole: 1. Profile picture (Q) 2. Job Summary from (B) 3. Job description content from (C) 1. C stole Job description content from (D)
  • 33. Summary • Be very vary who you connect with. • Hone your skills in detecting fake or fraudulent credentials, skills and profiles. • Be always diligent. • If you have the slightest doubt then don’t connect. 33 ©2015www.404Whylo.com™Allrightsreserved.27April,2015