13
Social Engineering (Because there is no patch for human stupidity) By: Shobhit Gautam Twitter @sh0bhit105

Social Engineering

Embed Size (px)

DESCRIPTION

Social Engineering by Shobhit Gautam @ null Mumbai Meet, September 2011

Citation preview

Page 1: Social Engineering

Social Engineering (Because there is no patch for human stupidity)

By: Shobhit GautamTwitter @sh0bhit105

Page 2: Social Engineering

What Is Social Engineering?

The art of manipulating people and getting them to do what you want.

“Social Engineering - A euphemism for non-technical or low-technology means - such as lies, impersonation, tricks, bribes, blackmail, and threat - used to attack information systems.”

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick.

Page 3: Social Engineering

Common Types of Social Engineering

Human-based

Computer-based

Page 4: Social Engineering

Personality Traits

Diffusion of responsibility

Chance for ingratiation

Trust relationship

Moral duty

Guilt

Identification

Desire to be Helpful

Cooperation

Page 5: Social Engineering

Techniques for persuasion

A Direct Route

Systematic and logical statement

A Peripheral Route

Beat around the BushTrigger strong emotions such as fear and excitement.

Page 6: Social Engineering

Human Based methods

Impersonating

Intimidation

Creating confusion

May I help you?

Can you help me?

Building Trust

Ask and It shall be given unto you seek and ye shall find.

Dumpster Diving

Page 7: Social Engineering

Computer Based

Popup Windows

Mail attachments

Spam, Chain Letters and Hoaxes Phishing Websites

USB devices

Key loggers

Page 8: Social Engineering

Social Engineering Toolkit

The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing.

SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset.

It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.

Page 9: Social Engineering
Page 10: Social Engineering

./set

Page 11: Social Engineering

How to Identify A Social Engineer?

Does not provide contact information

Always asks for forbidden information

Rushing Activities

Name-dropping

Intimidation

Observe for Small mistakes

Page 12: Social Engineering

Mitigation

Shredders

Policies and Procedures

Awareness

Updated patches and Anti Viruses/Malwares

Page 13: Social Engineering

NOW