+ All Categories
Home > Documents > Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis...

Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis...

Date post: 19-Jul-2020
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
27
Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant
Transcript
Page 1: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Social Engineering Techniques, Methods, Tools & Mitigation

Panagiotis Gkatziroulis, Security Consultant

Page 2: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Agenda

• Social Engineering Methodology

• Attacks & Techniques

• Demos

• Tools of the trade

• Prevention Methods and Advice

Page 3: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

What is Social Engineering?

Page 4: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Invest in Products…

Page 5: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Is Our Security Focus Wrong?

Page 6: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Why Security Fail???

Page 7: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Who Are The Threat Actors?

• Aggrieved ex-employees

• Internal Employees

• Activists

• Corporate Espionage

• Blackhat Hackers

Page 8: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Who Are The Targets?

Page 9: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

It Only Needs One…

Page 10: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Social Engineering Methodology

Page 11: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Social Engineering - Recon

Digital

• Search Engines

• Email Harvesting

• DNS Records

• Social Medial

• Metadata

• Public Records

Physical

• Physical Walk

• Dumpster Diving

• Tailgate Employees to Lunch Breaks

Page 12: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Social Engineering - Breach

•Obtain Domain Credentials via Phishing

Attacks

•Obtain Network Level Access via Spear

Phishing Attacks

•Bypass Physical Security Defences and

Obtain Corporate Documents

Page 13: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Attack Vectors

• Physical

• Phishing

• Telephone

• Shoulder Surfing

• Tailgating

Page 14: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Social Engineering Tactics

• Impersonation (Spoofed Emails, Telephone

Attacks, Scenario-based attacks)

• Urgency

• Obligation

• Authority

• Flattering

• Fear

Page 15: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Do you recognize the signs?

Page 16: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Do you recognize the signs?

Page 17: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Do you recognize the signs?

Page 18: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

NCC Test Case

Page 19: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Why This Attack Was Successful?

1. Trusted Source // IT Helpdesk

2. Promotes Fear // Accounts will be disabled

Lesson Learned?

Always Validate the Origin of the

Information!!!

Page 20: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Tools of The Trade

• SET

• TheHarvester

• Recon-NG

• Phishing Frenzy

• PwnPlug Devices

Page 21: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Physical to Cyber is Just One

Port Away….

Page 22: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Do You See These Stuff Often Internally?

Page 23: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Mitigations

• Limit Online Exposure

• Email and Web Gateway Solutions (URL Sandboxing etc.)

• Anti-tailgating Barriers

• Social Engineering Assessments

• Increase User Awareness via Trainings

• Policies (Escort visitors etc.)

Page 24: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Conclusion

• False Sense of Security (PCI DSS, Products

etc.)

• Management People are Reactive NOT

Proactive

• Strong Physical && Weak Human == Pwned

• Employees Must Feel Safe to Click Any Link

Inside Their Company Environment!!!

Page 25: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Any Questions???

Page 26: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

Website: trustforum.nccgroup.com

Twitter: @NCCTrustForum

Email: [email protected]

Page 27: Social Engineering · Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

UK Offices

Manchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Thame

North American Offices

San Francisco

Atlanta

New York

Seattle

Australian Offices

Sydney

European Offices

Amsterdam - Netherlands

Munich – Germany

Zurich - Switzerland


Recommended