Académique Documents
Professionnel Documents
Culture Documents
Simple Definition
Social engineering is a psycho-social attack that
subverts human trust and helpfulness in order to attain the attackers goals.
Outline
What is it? How is it done? Who is at risk? Approach?
What is it?
Social engineering is the oldest form of
hacking.
system. By gaining the trust of the user, a social engineer can simply ask for whatever information he or she wantsand usually get it.
the art and science of getting people to comply with your wishes
actions can alter these feelings by changing what they say and do make the victim want to give them the information they need
How is it done?
Attacks come in various forms:
impersonation
Impersonation
Play the part!
Social Engineers must: Anticipate problems Know jargon and procedures of the role
Impersonation
And most importantly, knowledge of how to
More techniques
Dummy Mode Bury the key question Research (Google)
E-mail attacks are very common (phishing). E-mail is also used for impersonation. Obtaining password for an IM account could
Dumpster diving
Digging through trash at corporations in search
of sensitive data.
Outline
What is it? How is it done? Who is at risk? Approach?
Who is at risk?
Everyone.
Everyone with information is a potential target!
for a pen.
bar of chocolate.
Approaches
Carelessness
Comfort Zone Helpfulness Fear
Careless Approach
Victim is Careless Does not implement, use, or enforce proper countermeasures Used for Reconnaissance
Looking for what is laying around
Careless Examples
Dumpster Diving/Trashing
Huge amount of information in the trash Most of it does not seem to be a threat The who, what and where of an organization Knowledge of internal systems Materials for greater authenticity Intelligence Agencies have done this for years
environment
Lower threat perception
Helpful Approach
People generally try to help even if they do not know
who they are helping Usually involves being in a position of obvious need Attacker generally does not even ask for the help they receive
Helpful Examples
Piggybacking Attacker will trail an employee entering the building More Effective:
Carry something large so they hold the door open for you Go in when a large group of employees are going in
Fear Approach
Usually draws from the other approaches
Puts the user in a state of fear and anxiety Very aggressive
Fear Examples
Conformity The user is the only one who has not helped out the attacker with this request in the past Personal responsibility is diffused User gets justification for granting an attack.
booklets detailing incidents and how they could have been prevented Signs, posters, coffee mugs, pens, pencils, mouse pads, screen savers, etc with security slogans (I.e. Loose lips sink ships).
Security Policy
Management should know the importance of
protecting against social engineering attacks Specific enough that employees should not have to make judgment calls Include procedure for responding to an attack
Areas of Risk
Certain areas have certain risks
What are the risks for these areas? Help Desk, Building entrance, Office, Mail Room, Machine room/Phone Closet, Dumpsters, Intranet/Internet, Overall
Conclusions
Social Engineering is a very real threat
Realistic prevention is hard Can be expensive Militant Vs. Helpful Helpdesk Staff Reasonable Balance
You could spend a fortune purchasing technology and services...and your network infrastructure could still remain vulnerable to old-fashioned manipulation.
-Kevin Mitnick
Questions
References
Psychological Based Social Engineering, Charles Lively. December
2003. SANS Institute. 10 September 2005. http://www.giac.org/certified_professionals/practicals/gsec/3547.php Sarah Granger, Social Engineering Fundamentals: Part I. Security Focus. December 2001. 10 September 2005. http://www.securityfocus.com/infocus/1527 Sarah Granger, Social Engineering Fundamentals: Part II. Security Focus. January 2002. 10 September 2005. http://www.securityfocus.com/infocus/1533