10
Social Engineering Mark Shtern

Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Embed Size (px)

DESCRIPTION

Goals Install spyware, other malicious software Trick persons into handing over passwords and/or other sensitive information

Citation preview

Page 1: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Social Engineering

Mark Shtern

Page 2: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Social Engineering

• SE is manipulating a person into knowingly or unknowingly giving up information

– Psychological manipulation

– Trickery

Page 3: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Goals

• Install spyware, other malicious software

• Trick persons into handing over passwords and/or other sensitive information

Page 4: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Movie

• http://www.youtube.com/watch?v=8TJ4XOvY7II&feature=related

• http://www.youtube.com/watch?v=-kW1DPPp1VQ

Page 5: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Tactics• Pretexting

• Phishing

• Fake Websites

• Fake Pop-up

• Reverse Social Engineering

• Phone Social Engineering

• Spoofing

– CallerID

– SMS

• TinyURL

Page 6: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Human nature• Reciprocity Principle - People tend to feel obliged to discharge

perceived debts .

• Authority Principle – People tend to respond to authority figures

• Social Proof Principle – People tend to use people who are similar to themselves as behaviour models

• Scarcity Principle – People value things they perceive as scarce more than things they perceive as common

• Consistency / Commitment Principle – People tend to act to maintain their self image (even without conscious knowledge)

Page 7: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Attack Pattern

• Information gathering

• Developing relationship

• Exploitation

• Execution

Page 8: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Examples

• Facebook

–Made a fake Facebook account to get access to your friends list.

• Twitter

– photo advertising a video with girls posted

• “new version of Adobe Flash” is required to watch the video

Page 9: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

Countermeasures

• Management buy-in

• Security policy

• Physical security

• Education/Awareness

• Good security architecture

• Limit data leakage

• Incident response strategy

• Security culture

Page 10: Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly…

RSA: Phishing Attacks • Sent phishing e-mail

– Subject

• "2011 Recruitment Plan"

– Attachment

• Excel spreadsheet with discovered Adobe Flash zero day flaw CVE 20110609

• Trojan

• Harvested credentials

• Obtained privileged access to the targeted system