24
Social Engineering Maulik Kotak (ROCKHACK)

Social engineering

Embed Size (px)

DESCRIPTION

Attacker uses human interaction to obtain or compromise information.Attacker my appear unassuming or respectable Pretend to be a new employee, repair man, May even offer credentials. By:Maulik Kotak

Citation preview

Page 1: Social engineering

Social EngineeringMaulik Kotak

(ROCKHACK)

Page 2: Social engineering

./whoami

0 If You want to Hack some one First Hack Your self.

0 I am NOT a Hacker Just Learner as Security analyst.

Page 3: Social engineering

“The Art of Social Hacking”

Page 4: Social engineering

Introduction

• What is Social Engineering?o Manipulate people into doing something,

rather than by breaking in using technical means

•  Types of Social Engineering o Quid Pro Quoo Phishingo Baitingo Pretextingo Diversion Theft

• Ways to prevent Social Engineering

Page 5: Social engineering
Page 6: Social engineering

What is Social Engineering?

• Attacker uses human interaction to obtain or compromise information

• Attacker my appear unassuming or respectableo Pretend to be a new employee, repair man, ecto May even offer credentials

• By asking questions, the attacker may piece enough information together to infiltrate a companies networko May attempt to get information from many sources

Page 7: Social engineering

Kevin Mitnick

Famous Social Engineer Hacker• Went to prison for hacking• Became ethical hacker

"People are generally helpful, especially to someone who is nice, knowledgeable or insistent."

Page 8: Social engineering

Kevin Mitnick - Art of Deception

• "People inherently want to be helpful and therefore are easily duped"

• "They assume a level of trust in order to avoid conflict"

• "It's all about gaining access to information that people think is innocuous when it isn't"

• Here a nice voice on the phone, we want to be helpful

• Social engineering cannot be blocked by technology alone

Page 9: Social engineering

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco office

o Tells guard he will get a new badgeo Pretend to work there, give manager name from another

brancho Fakes a phone conversation when caught

• Free food at McDonalds

Page 10: Social engineering

Live Example

• Convinced friend that I would help fix their computer

• People inherently want to trust and will believe someone when they want to be helpful

• Fixed minor problems on the computer and secretly installed remote control software 

• Now I  have total access to their computer through ultravnc viewer

Page 11: Social engineering

Types of Social Engineering

• Quid Pro Quoo Something for something

• Phishingo Fraudulently obtaining private information

• Baitingo Real world trojan horse

• Pretextingo Invented Scenario

• Diversion Thefto  A con

Page 12: Social engineering

Quid Pro Quo

• Something for Somethingo Call random numbers at a company, claiming to be

from technical support.

o Eventually, you will reach someone with a legitamite problem

o Grateful you called them back, they will follow your instructions

o The attacker will "help" the user, but will really have the victim type commands that will allow the attacker to install malware

Page 13: Social engineering

Phishing

• Fraudulently obtaining private informationo Send an email that looks like it came from a

legitimate business

o Request verification of information and warn of some consequence if not provided

o Usually contains link to a fraudulent web page that looks legitimate

o User gives information to the social engineer  Ex: Ebay Scam

Page 14: Social engineering

Phishing continued

• Spear Fishingo Specific phishing

Ex: email that makes claims using your name

• Vishing o Phone phishing o Rogue interactive voice system

Ex:call bank to verify information

Page 15: Social engineering

Baiting

• Real world Trojan horseo Uses physical media

o Relies on greed/curiosity of victim

o Attacker leaves a malware infected cd or usb drive in a location sure to be found

o Attacker puts a legitimate or curious lable to gain interest

o Ex: "Company Earnings 2009" left at company elevator Curious employee/Good samaritan uses User inserts media and unknowingly installs

malware

Page 16: Social engineering

Pretexting

• Invented Scenarioo  Prior Research/Setup used to establish legitimacy

 Give information that a user would normally not divulge

o This technique is used to impersonate Authority ect

Using prepared answers to victims questions

Other gathered information

o  Ex: Law Enforcement  Threat of alleged infraction to detain suspect

and hold for questioning

Page 17: Social engineering

Pretexting Real Example:

• Signed up for Free Credit Report

• Saw Unauthorized charge from another credit company

o Called to dispute charged and was asked for Credit Card Number

They insisted it was useless without the security code

o Asked for Social Security number

• Talked to Fraud Department at my bank 

Page 18: Social engineering

Weakest Link?

• No matter how strong your:o Firewallso Intrusion Detection Systemso Cryptographyo Anti-virus software

• You are the weakest link in computer security!o  People are more vulnerable than computers

 • "The weakest link in the security chain is the human

element" -Kevin Mitnick

Page 19: Social engineering

Ways to Prevent Social Engineering

Training

• User Awarenesso User knows that giving out certain information is bad

• Military requires Cyber Transportation to hold o Top Secret Security Clearance o Security Plus Certification

 • Policies

o Employees are not allowed to divulge private information

o Prevents employees from being socially pressured or tricked

Page 20: Social engineering

Ways to Prevent Social Engineering Cont..

• 3rd Party test - Ethical Hackero Have a third party come to your company and attempted

to hack into your networko 3rd party will attempt to glean information from

employees using social engineeringo Helps detect problems people have with security

• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about internal information

• Do not provide personal information, information about the company(such as internal network) unless authority of person is verified

Page 21: Social engineering

General Safety

• Before transmitting personal information over the internet, check the connection is secure and check the url is correct

• If unsure if an email message is legitimate, contact the person or company by another means to verify

• Be paranoid and aware when interacting with anything that needs protectedo The smallest information could compromise what you're

protecting

Page 22: Social engineering

Conclusion

• What is Social Engineering?o Manipulate people into doing something, rather than by

breaking in using technical means•  Types of Social Engineering

o Quid Pro Quoo Phishingo Baitingo Pretextingo Diversion Theft

• Ways to prevent Social Engineering

Page 23: Social engineering

Questions?

Page 24: Social engineering

THANK YOU !! For Regarding any question contact me !!

http://www.maulikkotak.webnode.comhttp://www.facebook.com/maulikkotakstar

http://www.twitter.com/maulikkotakstar