In the digital era, most sensitive information is stored on computers. Should you find yourself embroiled in an office rivalry with one of your colleagues, perhaps you are going for the same internal promotion for example – you can give yourself a head start on the competition by obtaining their password and rooting around in their computer for potentially damaging information to use against them at an appropriate point.
Here are the three techniques you will require to gain access to their log-in details:
Observe the target entering their password
- You will need to synchronise your routine with theirs and make sure you are standing in the vicinity when the target is logging onto their system. It helps if you have a plausible reason to be standing nearby like filling a cup by the water cooler.
- Observe one or two of their keystrokes every day.
- Record the keystrokes you identify. Try to take note of their order and where they are typed in the sequence.
- Concentrate on counting the keystrokes. How many are there in total?
- You now have the number of keystrokes and the order in which they appear in the sequence. The next task is to try to guess what the actual password is. It helps if you know a little bit about the life of your target eg. Children or pet’s names, hobbies, interests etc. as most people are so fearful of forgetting their password they often use a familiar reference. They also tend not to change them too often.
Dust the target’s keyboard to decipher the keys used in their password log-in
- Stay late after work and lightly dust a layer of talcum powder onto your target’s keyboard – not a lot, but just enough to leave an imprint on the keys if they are disturbed.
- Position yourself near the target’s desk after he or she logs into their computer.
- Manufacture a minor disaster or emergency that will require the target to leave the office for a few minutes…….here are some pre-constructed emergencies you can use:
- Send an email to them asking to go to the boss’s office asap to explain their recent expense report
- Tell them their motorbike has been spotted in the staff car park with a wheel missing
- Tell them the lady from payroll would like to discuss the pay rise they will be receiving next month
- As the target leaves their desk you’ll be able to determine which keys were used. Be sure to play dumb when they return and it turns out they haven’t actually received a pay rise. Simply say the message was meant for someone else.
- Determine the password from the set of keystrokes you now have. You might save a bit of time by watching Countdown to find out how the contestants construct words out of random collections of letters.
Use a key logger to track keystrokes
Computer hard drives are usually locked and password protected but the keyboard usually isn’t. You can exploit this security flaw by using a device called a key logger that you’ll need to attach to the target’s keyboard after work.
A key logger will record target input data and is as readily available on ebay as Selfie Sticks and Moon Candles.
Once installed, the device will resemble wiring that is part of the computer’s existing infrastructure.
Some of the early keystrokes the key logger records will be the password as well as financial data, fantasy football passwords (v. important), emails to the person they are having an affair with in the office etc. simply take this data and upload it to your computer.
Stay calm and good luck!
(Legal disclaimer: The W1nner’s Club accepts no responsibility whatsoever if you get sacked for hacking a colleague’s computer – this information is intended only as a guide).