+ All Categories
Home > Documents > Social Engineering

Social Engineering

Date post: 13-Nov-2014
Category:
Upload: firasco
View: 12 times
Download: 4 times
Share this document with a friend
Description:
Everything about Social Engineering.
Popular Tags:
26
JL and Firasco www.pizzaratings.com IT-Security 1 Social Engineering by JL and Firasco
Transcript
Page 1: Social Engineering

JL and Firascowww.pizzaratings.com

IT-Security 1

Social Engineeringby JL and Firasco

Page 2: Social Engineering

Contents

1. Definitions of Social Engineering (SE)2. Different types of Social Engineering3. How a Social Engineer proceeds (6 steps)4. Live example of Social Engineering (Movie)5. Why is Social Engineering so successful6. Is it ethical?

JL and Firascowww.pizzaratings.com

IT-Security 2

Page 3: Social Engineering

Definitions of Social Engineering

1. Involves exploiting the trusting nature of human beings to obtain information (human hacking)

2. The art and science of getting people to comply to your wishes

3. Is a collection of techniques used to manipulate people into performing actions or revealing confidential information

JL and Firascowww.pizzaratings.com

IT-Security 3

Page 4: Social Engineering

So now…

Raise your hand if you think you have ever been Social Engineered

JL and Firascowww.pizzaratings.com

IT-Security 4

Page 5: Social Engineering

JL and Firascowww.pizzaratings.com

IT-Security 5

Famous targets of Social Engineering

1. Industrial Spying2. Data Theft3. Idenitiy Theft4. Pizza4free5. Etc.

Page 6: Social Engineering

Types of Social Engineering

1. Phishing2. Trojan horse3. Quid pro Quo4. Pretexting

JL and Firascowww.pizzaratings.com

IT-Security 6

Page 7: Social Engineering

Types of Social Engineering: Phishing

JL and Firascowww.pizzaratings.com

IT-Security 7

Page 8: Social Engineering
Page 9: Social Engineering

Types of Social Engineering: Trojan Horse

JL and Firascowww.pizzaratings.com

IT-Security 9

Page 10: Social Engineering

Types of Social Engineering: Quid pro Quo (something for something)

JL and Firascowww.pizzaratings.com

IT-Security 10

Page 11: Social Engineering

Types of Social Engineering: Pretexting

JL and Firascowww.pizzaratings.com

IT-Security 11

Page 12: Social Engineering

How a Social Engineer proceeds

1.) ResearchCollect sufficient information about the target

which is going to be Social Engineered– Internet– Dumpster diving

JL and Firascowww.pizzaratings.com

IT-Security 12

Page 13: Social Engineering

How a Social Engineer proceeds

2.) Establish contact– Call– Visit in person (face-to-face)– Mail

JL and Firascowww.pizzaratings.com

IT-Security 13

Page 14: Social Engineering

How a Social Engineer proceeds

3.) Pretend using PretexingBe someone you are not

– Customer– Researcher– Technical support– Telephone survey

JL and Firascowww.pizzaratings.com

IT-Security 14

Page 15: Social Engineering

How a Social Engineer proceeds

4.) Extract informationUse specific wording in questions to achieve

goal– Could I just see your ID as an example?– Are generally interested in

advertising your products?

JL and Firascowww.pizzaratings.com

IT-Security 15

Page 16: Social Engineering

How a Social Engineer proceeds

5.) After getting neccessary informationTry hard not to loose the “connections“

– The target may not know that it has been Social Engineered

– Good “connections“ can always be helpful in the future so do not mess it up

JL and Firascowww.pizzaratings.com

IT-Security 16

Page 17: Social Engineering

How a Social Engineer proceeds

6.) Combine dataCombine the bits and pieces into data

– Most of the times you have only asked for pieces of information

– A collection of superficial-looking information can often be combined to aquire highly sensible data

– Aproximately 5 pieces of supericial data can get you 1 sensible piece of information

JL and Firascowww.pizzaratings.com

IT-Security 17

Page 18: Social Engineering

How a Social Engineer proceeds

Summary:1. Gathering of information2. Establish connection3. Pretend to be someone you are not4. Work your way to the main goal5. Keep good relationship with the victim6. Compile data

JL and Firascowww.pizzaratings.com

IT-Security 18

Page 19: Social Engineering

Real world example of Social Engineering (Click HERE to

play our movie)

JL and Firascowww.pizzaratings.com

IT-Security 19

Page 20: Social Engineering

Why is Social Engineering so successful

• A human being trusts another human up to a certain point

• People tend to obey to your orders when they see you got superior knowledge

• Makes all means of software and hardware protections USELESS

• Only very few companies and people are actually aware of the dangers of Social Engineering

• We do not like to say no

JL and Firascowww.pizzaratings.com

IT-Security 20

Page 21: Social Engineering

Why is Social Engineering so successful

• Flaws in human logic:1. Cognitive Biases2. Attribution Theory3. Reactance4. Context confusion5. Strong Affect6. Overloading

JL and Firascowww.pizzaratings.com

IT-Security 21

Page 22: Social Engineering

It’s discussion time

Is it ethical?

JL and Firascowww.pizzaratings.com

IT-Security 22

Page 23: Social Engineering

Definition of “ethical”

• Ethics is a general term for what is often described as the "science (study) of morality". In philosophy, ethical behavior is that which is "good" or "right."

JL and Firascowww.pizzaratings.com

IT-Security 23

Page 24: Social Engineering

Is it ethical?

JL and Firascowww.pizzaratings.com

IT-Security 24

Page 25: Social Engineering

Sources

• Wiley Publishing, Inc. - Social Engineering - 2nd Edition 2007

• http://www.securityfocus.com• http://en.wikipedia.org• www.ethicsscoreboard.com/rb_definitions.html

JL and Firascowww.pizzaratings.com

IT-Security 25

Page 26: Social Engineering

JL and Firascowww.pizzaratings.com

IT-Security 26

Why Social Engineering is so successful (continued)


Recommended