SlideShare uma empresa Scribd logo
1 de 24
Social Engineering 101 or The
Art of How You Got Owned by
That Random Stranger
BY: Steven Hatfield aka @drb0n3z
LEGAL DISCLAIMER
Social Engineering 101
▪ Definitions
▪ History
▪ Social Engineering Framework
▪ SET – Social Engineering Toolkit
▪ Categories
▪ Examples
▪ Protection
▪ Resources
▪ Questions
Definition
▪ Social Engineering (SE) is a blend of science, psychology and art. While
it is amazing
and complex, it is also very simple.
▪ We define it as, “Any act that influences a person to take an action
that may or may not be in their best interest.” We have defined it in
very broad and general terms because we feel that social engineering
is not always negative, but encompasses how we communicate with
our parents, therapists, children, spouses and others.
http://www.social-engineer.org/
Definition
▪ Social engineering is the art of manipulating people so they give up
confidential information. The types of information these criminals are
seeking can vary, but when individuals are targeted the criminals are
usually trying to trick you into giving them your passwords or bank
information, or access your computer to secretly install malicious
software–that will give them access to your passwords and bank
information as well as giving them control over your computer.
http://www.webroot.com/us/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
History
The term sociale ingenieurs was introduced in an essay by the Dutch industrialist J.C. Van Marken in 1894. The
idea was that modern employers needed the assistance of specialists—"social engineers"—in handling
the human problems of the planet, just as they needed technical expertise (ordinary engineers) to deal with the
problems of dead matter (materials, machines, processes). The term was brought to America in 1899, when the
notion of "social engineering" was also launched as the name of the task of the social engineer in this sense.
"Social engineering" was the title of a small journal in 1899 (from 1900 named "Social Service"), and in 1909 the
title of a book by its former editor, William H. Tolman (translated in French in 1910), marking the end of the
usage of the terminology in the sense of Van Marken. With the Social Gospel sociologist Edwin L. Earp'sThe
Social Engineer, published during the "efficiency craze" of 1911 in the U.S., the usage of the term was launched
that has since then been standard: the one building on a metaphor of social relations as "machineries", to be
dealt with in the manner of the technical engineer.
https://en.wikipedia.org/wiki/Social_engineering_(political_science)#History
Social Engineering Framework
•Social Engineering Defined
•Categories of Social Engineers
• Hackers
• Penetration Testers
• Spies or Espionage
• Identity Thieves
• Disgruntled Employees
• Information Brokers
• Scam Artists
• Executive Recruiters
• Sales People
• Governments
• Everyday People
•Why Attackers Might Use Social Engineering
•Typical Goals
•The Attack Cycle
•Common Attacks
• Customer Service
• Delivery Person
• Phone
• Tech Support
•Real World Examples
• Con Men
• Crime Victims
• Phishing
• Politicians
http://www.social-engineer.org/framework/general-discussion/
SET – Social Engineer Toolkit
https://www.trustedsec.com/social-engineer-toolkit/
The Social-Engineer Toolkit (SET) was created and written by the
founder of TrustedSec. It is an open-source Python-driven tool aimed at
penetration testing around Social-Engineering. SET has been presented
at large-scale conferences including Blackhat, DerbyCon, Defcon, and
ShmooCon. With over two million downloads, SET is the standard for
social-engineering penetration tests and supported heavily within the
security community.
The Social-Engineer Toolkit has over 2 million downloads and is aimed
at leveraging advanced technological attacks in a social-engineering
type environment. TrustedSec believes that social-engineering is one of
the hardest attacks to protect against and now one of the most
prevalent. The toolkit has been featured in a number of books including
the number one best seller in security books for 12 months since its
release, “Metasploit: The Penetrations Tester’s Guide” written by
TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati
Aharoni.
SOCIAL ENGINEER TOOLKIT
Examples - Common
• Customer Service
• Delivery Person
• Phone
• Tech Support
• Con Men
• Crime Victims
• Phishing
• Politicians
Examples - Real World
•The Overconfident CEO
In one case study, Hadnagy outlines how he was hired as an SE
auditor to gain access to the servers of a printing company
which had some proprietary processes and vendors that
competitors were after. In a phone meeting with Hadnagy's
business partner, the CEO informed him that "hacking him
would be next to impossible" because he "guarded his secrets
with his life.“
"He was the guy who was never going to fall for this," said
Hadnagy. "He was thinking someone would probably call and
ask for his password and he was ready for an approach like
that.“
…
http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html
Examples - Real World
•The theme-park scandal
http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html
The target in this next case study was a theme park client that
was concerned about potential compromise of its ticketing
system. The computers used to check-in patrons also contained
links to servers, client information and financial records. The
client was concerned that if a check-in computer was
compromised, a serious data breach might occur.
Hadnagy started his test by calling the park, posing as a
software salesperson. He was offering a new type of PDF-
reading software, which he wanted the park to try through a
trial offer. He asked what version they were currently using, got
the information easily, and was ready for step two.
…
Examples - Real World
•The hacker is hacked
http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html
Hadnagy gives a third example showing how social engineering
was used for defensive purposes. He profiles 'John,' a
penetration tester hired to conduct a standard network pen
test for a client. He ran scan using Metasploit, which revealed
an open VNC (virtual network computing) server, a server that
allows control of other machines on the network.
He was documenting the find with the VNC session open when,
suddenly, in the background, a mouse began to move across
the screen. John new it was a red flag because at the time of
day this was happening, no user would be connected to the
network for a legitimate reason. He suspected an intruder was
on the network.
…
Examples - Real World
•Price-Matching Scam
Examples - Real World
•Evil Maid attacks
Examples - Real World
•Stuxnet
…
Stuxnet – delivered via USB sticks left around the Iranian site in
a classic "social engineering" attack – used unpatched Windows
vulnerabilities to get inside the SCADA at Iran's Natanz
enrichment plant. It then injected code to make a PLC speed up
and slow down centrifuge motors – wrecking more than 400
machines. Siemens made both the SCADA (WinCC) and the PLC
(S7-300) attacked by Stuxnet.
…
http://www.newscientist.com/article/dn20298-stuxnet-analysis-finds-more-holes-in-critical-software.html
Examples - Real World
•Sing-o-gram - Michelle from SE crew
…
Next, Chris and I packed our dark glasses and super-spy cameras and headed to the client’s
locations. Four buildings, three days, two states, no sleep. This particular client faces some big
challenges when it comes to physical plant security, not the least of which is sharing buildings with
other companies and retailers open to the general public. Despite having a great physical security
team and RFID badging, we were able to gain access to most of their secured locations pretexting
as inspectors and yes, a singing telegram (I’ll let you guess who got to do that one). We didn’t
really need to do a lot of sneaky stuff; we took advantage of high traffic times and locations, acted
like we belonged there, and exploited people’s general helpfulness. Using these principles, we
accessed areas such their corporate mailroom, NOC, and executive offices and roamed freely
without ever being stopped.
…
http://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-05-issue-57/
Examples - Real World
•News Reporter - “Bob”
“I've gotten myself into a building by claiming to be interviewing them for a blog and
then spending all day taking pictures and plugging flashdrives in to “print stuff“”
Protection
Obviously, never give out confidential information.
Safeguard even inconsequential information about yourself.
Lie to security questions, and remember your lies.
View every password reset email with skepticism.
Watch your accounts and account activity.
Diversify passwords, critical services, and security questions.
Resources
http://www.social-engineer.org/
https://www.trustedsec.com/social-engineer-toolkit/
http://shop.riftrecon.com/products/art-of-escape
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger

Mais conteúdo relacionado

Mais procurados

Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
 

Mais procurados (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social engineering
Social engineering Social engineering
Social engineering
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
social engineering
 social engineering social engineering
social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 

Destaque

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Infosecurity2010
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
franco_bb
 

Destaque (20)

CyberLab CCEH Session - 9 Social Engineering
CyberLab CCEH Session - 9 Social EngineeringCyberLab CCEH Session - 9 Social Engineering
CyberLab CCEH Session - 9 Social Engineering
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Social Engineering for Everyday (Startup) Life - Extended
Social Engineering for Everyday (Startup) Life - ExtendedSocial Engineering for Everyday (Startup) Life - Extended
Social Engineering for Everyday (Startup) Life - Extended
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Dark Arts Of Social Engineering
Dark Arts Of Social EngineeringDark Arts Of Social Engineering
Dark Arts Of Social Engineering
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Law as an instrument of social engineering
Law  as  an  instrument  of  social  engineeringLaw  as  an  instrument  of  social  engineering
Law as an instrument of social engineering
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 

Semelhante a Social engineering 101 or The Art of How You Got Owned by That Random Stranger

Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
Pavlos Isaris
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 

Semelhante a Social engineering 101 or The Art of How You Got Owned by That Random Stranger (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
IT Quiz MES
IT Quiz MESIT Quiz MES
IT Quiz MES
 
Module 9 (social engineering)
Module 9 (social engineering)Module 9 (social engineering)
Module 9 (social engineering)
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Social engineering 101 or The Art of How You Got Owned by That Random Stranger

  • 1. Social Engineering 101 or The Art of How You Got Owned by That Random Stranger BY: Steven Hatfield aka @drb0n3z
  • 3. Social Engineering 101 ▪ Definitions ▪ History ▪ Social Engineering Framework ▪ SET – Social Engineering Toolkit ▪ Categories ▪ Examples ▪ Protection ▪ Resources ▪ Questions
  • 4. Definition ▪ Social Engineering (SE) is a blend of science, psychology and art. While it is amazing and complex, it is also very simple. ▪ We define it as, “Any act that influences a person to take an action that may or may not be in their best interest.” We have defined it in very broad and general terms because we feel that social engineering is not always negative, but encompasses how we communicate with our parents, therapists, children, spouses and others. http://www.social-engineer.org/
  • 5. Definition ▪ Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer. http://www.webroot.com/us/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
  • 6.
  • 7. History The term sociale ingenieurs was introduced in an essay by the Dutch industrialist J.C. Van Marken in 1894. The idea was that modern employers needed the assistance of specialists—"social engineers"—in handling the human problems of the planet, just as they needed technical expertise (ordinary engineers) to deal with the problems of dead matter (materials, machines, processes). The term was brought to America in 1899, when the notion of "social engineering" was also launched as the name of the task of the social engineer in this sense. "Social engineering" was the title of a small journal in 1899 (from 1900 named "Social Service"), and in 1909 the title of a book by its former editor, William H. Tolman (translated in French in 1910), marking the end of the usage of the terminology in the sense of Van Marken. With the Social Gospel sociologist Edwin L. Earp'sThe Social Engineer, published during the "efficiency craze" of 1911 in the U.S., the usage of the term was launched that has since then been standard: the one building on a metaphor of social relations as "machineries", to be dealt with in the manner of the technical engineer. https://en.wikipedia.org/wiki/Social_engineering_(political_science)#History
  • 8. Social Engineering Framework •Social Engineering Defined •Categories of Social Engineers • Hackers • Penetration Testers • Spies or Espionage • Identity Thieves • Disgruntled Employees • Information Brokers • Scam Artists • Executive Recruiters • Sales People • Governments • Everyday People •Why Attackers Might Use Social Engineering •Typical Goals •The Attack Cycle •Common Attacks • Customer Service • Delivery Person • Phone • Tech Support •Real World Examples • Con Men • Crime Victims • Phishing • Politicians http://www.social-engineer.org/framework/general-discussion/
  • 9. SET – Social Engineer Toolkit https://www.trustedsec.com/social-engineer-toolkit/ The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community. The Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best seller in security books for 12 months since its release, “Metasploit: The Penetrations Tester’s Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni.
  • 11. Examples - Common • Customer Service • Delivery Person • Phone • Tech Support • Con Men • Crime Victims • Phishing • Politicians
  • 12. Examples - Real World •The Overconfident CEO In one case study, Hadnagy outlines how he was hired as an SE auditor to gain access to the servers of a printing company which had some proprietary processes and vendors that competitors were after. In a phone meeting with Hadnagy's business partner, the CEO informed him that "hacking him would be next to impossible" because he "guarded his secrets with his life.“ "He was the guy who was never going to fall for this," said Hadnagy. "He was thinking someone would probably call and ask for his password and he was ready for an approach like that.“ … http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html
  • 13. Examples - Real World •The theme-park scandal http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html The target in this next case study was a theme park client that was concerned about potential compromise of its ticketing system. The computers used to check-in patrons also contained links to servers, client information and financial records. The client was concerned that if a check-in computer was compromised, a serious data breach might occur. Hadnagy started his test by calling the park, posing as a software salesperson. He was offering a new type of PDF- reading software, which he wanted the park to try through a trial offer. He asked what version they were currently using, got the information easily, and was ready for step two. …
  • 14. Examples - Real World •The hacker is hacked http://www.csoonline.com/article/2126983/social-engineering/social-engineering--3-examples-of-human-hacking.html Hadnagy gives a third example showing how social engineering was used for defensive purposes. He profiles 'John,' a penetration tester hired to conduct a standard network pen test for a client. He ran scan using Metasploit, which revealed an open VNC (virtual network computing) server, a server that allows control of other machines on the network. He was documenting the find with the VNC session open when, suddenly, in the background, a mouse began to move across the screen. John new it was a red flag because at the time of day this was happening, no user would be connected to the network for a legitimate reason. He suspected an intruder was on the network. …
  • 15. Examples - Real World •Price-Matching Scam
  • 16. Examples - Real World •Evil Maid attacks
  • 17. Examples - Real World •Stuxnet … Stuxnet – delivered via USB sticks left around the Iranian site in a classic "social engineering" attack – used unpatched Windows vulnerabilities to get inside the SCADA at Iran's Natanz enrichment plant. It then injected code to make a PLC speed up and slow down centrifuge motors – wrecking more than 400 machines. Siemens made both the SCADA (WinCC) and the PLC (S7-300) attacked by Stuxnet. … http://www.newscientist.com/article/dn20298-stuxnet-analysis-finds-more-holes-in-critical-software.html
  • 18. Examples - Real World •Sing-o-gram - Michelle from SE crew … Next, Chris and I packed our dark glasses and super-spy cameras and headed to the client’s locations. Four buildings, three days, two states, no sleep. This particular client faces some big challenges when it comes to physical plant security, not the least of which is sharing buildings with other companies and retailers open to the general public. Despite having a great physical security team and RFID badging, we were able to gain access to most of their secured locations pretexting as inspectors and yes, a singing telegram (I’ll let you guess who got to do that one). We didn’t really need to do a lot of sneaky stuff; we took advantage of high traffic times and locations, acted like we belonged there, and exploited people’s general helpfulness. Using these principles, we accessed areas such their corporate mailroom, NOC, and executive offices and roamed freely without ever being stopped. … http://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-05-issue-57/
  • 19. Examples - Real World •News Reporter - “Bob” “I've gotten myself into a building by claiming to be interviewing them for a blog and then spending all day taking pictures and plugging flashdrives in to “print stuff“”
  • 20. Protection Obviously, never give out confidential information. Safeguard even inconsequential information about yourself. Lie to security questions, and remember your lies. View every password reset email with skepticism. Watch your accounts and account activity. Diversify passwords, critical services, and security questions.