hiexam
eccouncil · 312-50v12 · Q426 · multiple_choice · topic_1

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location…

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?
  • A.ophcrack
  • B.VisualRoute
  • C.Hootsuite
  • D.HULK
Explanation
Selected Answer: C C. Hootsuite Like 312-50 V11 Q218 CEH BOOK V12 Module 02 P181 Conducting location search on social media sites such as Twitter, Instagram, and Facebook helps attackers to detect the geolocation of the target. This information further helps attackers to perform various social engineering and non-technical attacks. Many online tools such as Followerwonk, Hootsuite, and Meltwater are available to search for both geotagged and non-geotagged information on social media sites. Attackers search social media sites using these online tools using keywords, usernames, date, time, and so on.

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.