⚡︎ This chapter has practical labs
Social Engineering is the art of manipulating a person or group into providing information or a service they would otherwise not have given.
- 🔍 Research target company
- Dumpster dive, visit websites, tour the company, etc
- 🎯 Select the victim
- Identify frustrated employee or other target
- 💬 Build a relationship
- Develop relationship with target employee
- 💰 Exploit the relationship
- Collect sensitive information and current technologies
- Authority
- Impersonate or imply a position of authority
- Intimidation
- Frighten by threat
- Consensus / Social proof
- To convince of a general group agreement
- Scarcity
- The situation will not be this way for long
- Urgency
- Works alongside scarcity / act quickly, don't think
- Familiarity
- To imply a closer relationship
- Trust
- To assure reliance on their honesty and integrity
- Human nature/Trust - trusting others
- Ignorance of social engineering efforts
- Fear of consequences of not providing the information
- Greed - promised gain for providing requested information
- A sense of moral obligation
- Insufficient training
- Lack of controls
- Technical
- e.g: Firewall rule, ACL rules, patch management (...)
- Administrative
- e.g: Mandatory Vacations, Job Rotation, Separation of Duties (...)
- Physical
- e.g: Proper Lighting, Cameras, Guards, Mantraps (...)
- Technical
- Size of the Company Matters
- Lack of Policies
- Promiscuous Policy
- Permisive Policy
- Prudent Policy
- Paranoid Policy
-
Dumpster Diving - Looking for sensitive information in the trash
- Shredded papers can sometimes indicate sensitive info
-
Impersonation - Pretending to be someone you're not
- Can be anything from a help desk person up to an authoritative figure (FBI agent)
- Posing as a tech support professional can really quickly gain trust with a person
-
Shoulder Surfing - Looking over someone's shoulder to get info
- Can be done long distance with binoculars, etc.
-
Eavesdropping - Listening in on conversations about sensitive information
-
Tailgating - Attacker walks in behind someone who has a valid badge. (e.g: Holding boxes or simply by following without getting notice)
-
Piggybacking - Attacker pretends they lost their badge and asks someone to hold the door
-
RFID Identity Theft (RFID skimming) - Stealing an RFID card signature with a specialized device
-
Reverse Social Engineering - Getting someone to call you and give information
- Often happens with tech support - an email is sent to user stating they need them to call back (due to technical issue) and the user calls back
- Can also be combined with a DoS attack to cause a problem that the user would need to call about
- Always be pleasant - it gets more information
-
Insider Attack - An attack from an employee, generally disgruntled
- Sometimes subclassified (negligent insider, professional insider)
Can begin with sites like Facebook where information about a person is available; For instance - if you know Bob is working on a project, an email crafted to him about that project would seem quite normal if you spoof it from a person on his project.
-
Phishing - crafting an email that appears legitimate but contains links to fake websites or to download malicious content.
- Ways to Avoid Phishing
- Beware unknown, unexpected or suspicious originators
- Beware of who the email is addressed to
- Verify phone numbers
- Beware bad spelling or grammar
- Always check links
- Ways to Avoid Phishing
-
Spear Phishing - Targeting a person or a group with a phishing attack.
- Can be more useful because attack can be targeted
-
Whaling - Going after CEOs or other C-level executives.
-
Pharming - Make a user's traffic redirects to a clone website; may use DNS poisoning.
-
Spamming - Sending spam over instant message.
-
Fake Antivirus - Very prevalent attack; pretends to be an anti-virus but is a malicious tool.
-
SET (Social Engineering Toolkit) - Pentest tool design to perform advanced attacks against human by exploiting their behavior.
-
PhishTank - For phishing detection
-
Wifiphisher - Automated phishing attacks against Wi-Fi networks in order to obtain credentials or inject malware.
-
SPF SpeedPhish framework - Quick recon and deployment of simple social eng. exercises
- ZitMo (ZeuS-in-the-Mobile) - banking malware that was ported to Android
- SMS messages can be sent to request premium services
- Attacks
- Publishing malicious apps
- Repackaging legitimate apps
- Fake security applications
- SMS (smishing)
- Physical measures - everything you can touch, taste, smell or get shocked by
- Includes things like air quality, power concerns, humidity-control systems
- Technical measures - smartcards and biometrics
- Operational measures - policies and procedures you set up to enforce a security-minded operation
- Access controls - physical measures designed to prevent access to controlled areas
- Biometrics - measures taken for authentication that come from the "something you are" concept
- False rejection rate (FRR) - when a biometric rejects a valid user
- False acceptance rate (FAR) - when a biometric accepts an invalid user
- Crossover error rate (CER) - combination of the two; determines how good a system is
- Biometrics - measures taken for authentication that come from the "something you are" concept
- Even though hackers normally don't worry about environmental disasters, this is something to think of from a pen test standpoint (hurricanes, tornadoes, floods, etc.)
- Separation of duties
- Rotation of duties
- Controlled Access
- Least privilege
- Logging & Auditing
- Policies