+ All Categories
Home > Engineering > Conference about Social Engineering (by Wh0s)

Conference about Social Engineering (by Wh0s)

Date post: 10-Jul-2015
Category:
Upload: wh0s
View: 152 times
Download: 0 times
Share this document with a friend
Popular Tags:
29
Marta Barrio Marcos Daniel González Gutiérrez
Transcript
Page 1: Conference about Social Engineering (by Wh0s)

Marta Barrio Marcos

Daniel González Gutiérrez

Page 2: Conference about Social Engineering (by Wh0s)

Summary

• What is Social Engineering?

• Techniques

• Why are we vulnerable?

• Famous Social Engineers

• Conclusions

Page 3: Conference about Social Engineering (by Wh0s)

What is SE?

“Social engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is

usually to release information or to perform some sort of action item that benefits that

attacker.”

Kevin Mitnick

Page 4: Conference about Social Engineering (by Wh0s)

What is SE?

Psychological manipulation

Goals:

• Performing actions

• Divulging confidential information

• Confidence trick for the purpose of information

gathering, fraud, or system access

Page 5: Conference about Social Engineering (by Wh0s)

What is SE?

Life Cycle:

1. Footprinting

2. Establishing Trust

3. Psychological Manipulation

4. The Exit

Page 6: Conference about Social Engineering (by Wh0s)

Footprinting

Accumulating information:• Target

• Environment

Such as:• List of employee and phone numbers

• Organization Chart

• Location information

Software tools:• Maltego

• SET

• Creepy

Page 7: Conference about Social Engineering (by Wh0s)

Footprinting: Maltego

Page 8: Conference about Social Engineering (by Wh0s)

Footprinting: creepy

Page 9: Conference about Social Engineering (by Wh0s)

Establishing Trust

Develop a relationship

with the targetGenerate trust

Confidential information

Page 10: Conference about Social Engineering (by Wh0s)

Psychological Manipulation

Manipulatethe trust

Penetrate intothe system

easily

Next Target / Exploiting theactual system

Page 11: Conference about Social Engineering (by Wh0s)

The Exit

• Clear Exit

• Avoid Suspicion

• Not to leave any proof of his visit:

• Trace-back to his real identity

• Link him to the unauthorized entry into

the system in the future

Page 12: Conference about Social Engineering (by Wh0s)

Techniques

• Goal: Get Information

• Techniques:• Shoulder Surfing

• Impersonation

• Phishing

• Reverse Social Engineering

• Dumpster Diving

• Trojan Horses

• Surfing Online Contents

Page 13: Conference about Social Engineering (by Wh0s)

Shoulder Surfing

• Direct observation technique (looking

over someone’s shoulder):

• Passwords

• Security Codes

• PINs

Page 14: Conference about Social Engineering (by Wh0s)

Impersonation

The social engineer plays the role of someone youare likely to trust.

• Roles:• IT support

• Fellow employee

• Someone in authority

• They use:• Uniforms

• ID badge

• Insider information

• Names and details abut employees

Page 15: Conference about Social Engineering (by Wh0s)

Phishing

• False websites/emails

• Look like the originals

• Deceive users

• Get private information

• Get benefit

Page 16: Conference about Social Engineering (by Wh0s)

Phishing

*From infography in www.ThreatSim.com

Page 17: Conference about Social Engineering (by Wh0s)

Phishing

Page 18: Conference about Social Engineering (by Wh0s)

Phishing

Page 19: Conference about Social Engineering (by Wh0s)

Reverse Social Engineering

The attacker convinces the target that he has a

problem and the attacked is ready to help to

solve the problem.

• Sabotage: the attacker corrupts the system or

give it an appearance of being corrupted.

• Marketing: the only person who can solve the

problem is the attacker.

• Support: he gains the trust of the target (access

to sensitive information).

Page 20: Conference about Social Engineering (by Wh0s)

Dumpster Diving

Garbage Picking

• Find items that may prove useful:

Page 21: Conference about Social Engineering (by Wh0s)

Trojan Horses

Malware program with malicious code.

• Download a malicious file to the system.

• Open a backdoor.

• Access to the victim machine.

Page 22: Conference about Social Engineering (by Wh0s)

Trojan Horses

Page 23: Conference about Social Engineering (by Wh0s)

Surfing Online Contents

Emails; Phone numbers; Employers

names…

• Whois

• Official website

• Forums

• Software Tools

Page 24: Conference about Social Engineering (by Wh0s)

Why are we vulnerable?

• Why are we vulnerable to SE?

1. We all want to help

2. The first move is always trusted the

others

3. We hate to say “no”

4. We all love that we praise

Page 25: Conference about Social Engineering (by Wh0s)

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards – and even then I have my doubts.”

Gene Sparfford, expert in computer security.

Why are we vulnerable?

“You can always convince someone to turn it on.”Social Engineering.

Page 26: Conference about Social Engineering (by Wh0s)

Famous Social Engineers

Kevin Mitnick

“The World’s Most Wanted Hackers”

• 15 years old: he could ride any bus (free)

• 1981: COSMOS, Pacific Bell

• Arrested in 1981, 1983, 1987, 1995

• Author of “The art of deception”

Page 27: Conference about Social Engineering (by Wh0s)

Famous Social Engineers

Christopher Hadnagy

• www.social-engineer.org

• Work in backtrack

• Author of:• Elicitation

• Pretexting

• Micro expressions

• Tools of the Social Engineer

Page 28: Conference about Social Engineering (by Wh0s)

Conclusions

1Importance of

Information

2 The biggest vulnerability are…

Common Sense

US

Page 29: Conference about Social Engineering (by Wh0s)

DEMOS

• Demo 1: Stealing credentials in

facebook

• Demo 2: Exploit a vulnerability in a

computer and get total control

To… CONTROL YOUR SYSTEM


Recommended