SlideShare a Scribd company logo
1 of 29
Download to read offline
SESSION ID:
#RSAC
Zee Abdelnabi
THE ART OF HACKING A HUMAN
HUM-W04
In-Vehicle Security Engineer
Major Automotive Company
@Infosec_17
#RSAC
The Art of Hacking a Human
2
First Impressions: Based off perceived stereotypes
Humans can be programmed: They set up their own internal
firewalls with interaction rules
Do we want to allow or block this person in our comfort zone?
#RSAC
Attack Path
3
External reconnaissance – internet searches, social
engineering, “dumpster diving”
Initial breach (breaking in) – scanning, open ports, services,
vulnerable apps, weak protection of data transit
Escalate privileges – exploiting a bug, design flaw or
configuration, taking advantage of programming errors
Persistence – breach undetected for a long period of time
#RSAC
Attack Path
4
Internal reconnaissance
Lateral breach – need users with more access, more admin
rights to relevant services and servers
Maintain presence
Achieve objective
#RSAC
Reconnaissance
5
Collecting information about an intended human target:
Do your research
Check their desk
Ask around
Watch them in the cafeteria
Look at previous work history
#RSAC
Initial Breach: Breaking Into The Human
6
Determine what “operating system” they are running:
What patches are in place?
What vulnerabilities can you exploit?
What “configuration issues” does this person have?
#RSAC
No Luck: Why?
7
Discover that there are different personality types
Learn the different types of personalities
Learn to adjust in order to know how to interact with that person
#RSAC
Understand how People Operate
8
Most people are social creature
Most people want to be a part of a group
How can you leverage that
#RSAC
Focus On You
9
The way you view things
Why you don’t like them
The way you communicate can change how you get along
“Be kind, for everyone you meet is fighting a hard battle.” ~ Ian MacLaren
#RSAC
10
#RSAC
Altering Perceptions
11
Different points of view will differ from the location and
perception of the Subject.
#RSAC
Escalate Privileges
12
Taking advantage of their flaws.
Persuade the Target:
Demonstrate Honesty and Respect By:
Meet with them – have a list of things you want to accomplish
while on the same team
Ask target how you could earn their trust
Ask if they need help with assignments
Invite to lunch
Ask questions pertaining to them
#RSAC
Ego Defense Mechanisms
13
Different defense mechanisms helps identify the person.
Lash out: Get protective to protect their pride even though
they know they’re wrong
No insight they are wrong. Or, they know there is a chance
they could be wrong, but they won’t admit wrong
#RSAC
Micro Expressions
14
Clues people give up are on their face; impossible to control.
If you can read these clues, you’ll understand where the
conversation is going
Are you connecting?
Are they comfortable?
#RSAC
The Reason They Don’t Like You
15
May not be valid
Could be stereotypes
Break those stereotypes
#RSAC
Persistence
16
Will not happen overnight; it is a gradual process.
Find a mentor and ask for advice
Network using target’s mutual friends
#RSAC
Lateral Breach
17
A hacker will need more intelligence that come from data points.
Mutual friends
#RSAC
Achieve Objective
18
As a User, you will be able to work with different Personalities
based on what the Hacking results tell you
#RSAC
The Bad Boss
19
Goes by the book and micromanages.
Acts a certain way because they have not been shown respect
and have received negative feedback.
Difficult to beat in a match, you can’t just flip the board and walk
away.
#RSAC
Engage The Boss
20
#RSAC
8 Types Of Leaders
21
#RSAC
Throughout The Hacking Process
22
Remember that communication is the key
If you cannot help somebody at least don’t hurt them
“People fail to get along because they fear each other; they fear
each other because they don't know each other; they don't know
each other because they have not communicated with
each other.” ~ The Dalai Lama
#RSAC
Winning The Hacking Game
23
Respecting all religious traditions
Exploiting and bullying will never win you any real friends
Kindness and compassion will give rise to self confidence, which
empowers you to be honest, truthful and transparent.
#RSAC
We Are All The Same
24
“And while on a secondary level differences exist of
nationality, faith, family background, social status
and so on, more important is that on a human level
we are the same. None of us wants to face problems,
and yet we create them by stressing our differences.
If we see each other just as fellow human beings,
there'll be no basis for fighting or conflict between
us.” ~ The Dalai Lama
#RSAC
You Are Confined By The Walls You Build
25
Look at yourself, the stereotypes people notice
The way you talk to people
Your perceptions
Do you let the way people treat you become the way you treat
others
#RSAC
You Attract
26
The only time someone can drive you crazy is if you are willing to
be their passenger.
Reciprocal socialization: This is what parents to do teach their
kids to be adults.
Employees: The way you talk is the way you want to be treated
Socialization – negative/positive
Any Company – Employees – Different Personalities – Success
#RSAC
#RSAC
Apply
28
This talk will help you realize that sometimes we are the problem
and not that other person. Learn to gather your information about
that person before jumping to conclusions of why they don’t like
you.
Look at the cultural environment you are in, is this why that person
is the way they are?
Use technical and non-technical techniques to get along better with
people. Use positive energy
#RSAC
Apply
29
Look at the way you treat others.
Understand how people operate.
Be able to understand different personalities based on
somebody's micro expressions, ego defense mechanism and
understand that the way you socialize with people sets
boundaries and limits on how they interact with you

More Related Content

What's hot

Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Управление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзииУправление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзииPositive Hack Days
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)ENOInstitute
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill ChainEMC
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementPriyanka Aash
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report Morane Decriem
 
The Offensive Defender | Cyberspace Trapping
The Offensive Defender  | Cyberspace TrappingThe Offensive Defender  | Cyberspace Trapping
The Offensive Defender | Cyberspace TrappingMatthew Toussain
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9UISGCON
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskGlobal CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskEC-Council
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 

What's hot (16)

Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Управление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзииУправление рисками: как перестать верить в иллюзии
Управление рисками: как перестать верить в иллюзии
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill Chain
 
CyberSecurity Portfolio Management
CyberSecurity Portfolio ManagementCyberSecurity Portfolio Management
CyberSecurity Portfolio Management
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
The Offensive Defender | Cyberspace Trapping
The Offensive Defender  | Cyberspace TrappingThe Offensive Defender  | Cyberspace Trapping
The Offensive Defender | Cyberspace Trapping
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity RiskGlobal CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
Global CISO Forum 2017: How To Measure Anything In Cybersecurity Risk
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 

Similar to The Art of Hacking a Human

Nfs3 workshop oct 2016 version c
Nfs3 workshop oct 2016 version cNfs3 workshop oct 2016 version c
Nfs3 workshop oct 2016 version cLeahcim Semaj
 
Little Black Book of Connections Book Exploration by Laurie Hawkins
Little Black Book of Connections Book Exploration by Laurie HawkinsLittle Black Book of Connections Book Exploration by Laurie Hawkins
Little Black Book of Connections Book Exploration by Laurie HawkinsLaurie Hawkins
 
How Many People Do You Really Know
How Many People Do You Really KnowHow Many People Do You Really Know
How Many People Do You Really KnowLynnme1205
 
Effective Networking For Employment
Effective Networking For EmploymentEffective Networking For Employment
Effective Networking For EmploymentMazhar Irfan
 
Annual Security Refresher
Annual Security RefresherAnnual Security Refresher
Annual Security Refresheroscedge
 
Building A High Performance Network That Works Ed Mayuga Amm Communica...
Building A High Performance Network That Works      Ed Mayuga   Amm Communica...Building A High Performance Network That Works      Ed Mayuga   Amm Communica...
Building A High Performance Network That Works Ed Mayuga Amm Communica...AMM COMMUNICATIONS, LLC
 
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...Jeremy Ott
 
Networking for Success Second Edition
Networking for Success Second EditionNetworking for Success Second Edition
Networking for Success Second EditionSandra Palmer
 
Continous improvement
Continous improvementContinous improvement
Continous improvementMichał Gruca
 
Why and how to network
Why and how to networkWhy and how to network
Why and how to networkJames Burton
 
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And Others
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And OthersJDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And Others
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And OthersPROIDEA
 
CreativeDynamix Networking and Creative Strategy Generation
CreativeDynamix Networking and Creative Strategy GenerationCreativeDynamix Networking and Creative Strategy Generation
CreativeDynamix Networking and Creative Strategy GenerationRoisin Markham
 
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula Berg
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula BergSocial Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula Berg
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula BergSocial Fresh Conference
 
Networking Your Way To Success
Networking Your Way To SuccessNetworking Your Way To Success
Networking Your Way To SuccessGian Fiero
 

Similar to The Art of Hacking a Human (20)

Captivate Slideshare Hacks
Captivate Slideshare HacksCaptivate Slideshare Hacks
Captivate Slideshare Hacks
 
Nfs3 workshop oct 2016 version c
Nfs3 workshop oct 2016 version cNfs3 workshop oct 2016 version c
Nfs3 workshop oct 2016 version c
 
Little Black Book of Connections Book Exploration by Laurie Hawkins
Little Black Book of Connections Book Exploration by Laurie HawkinsLittle Black Book of Connections Book Exploration by Laurie Hawkins
Little Black Book of Connections Book Exploration by Laurie Hawkins
 
How Many People Do You Really Know
How Many People Do You Really KnowHow Many People Do You Really Know
How Many People Do You Really Know
 
Effective Networking For Employment
Effective Networking For EmploymentEffective Networking For Employment
Effective Networking For Employment
 
Annual Security Refresher
Annual Security RefresherAnnual Security Refresher
Annual Security Refresher
 
The Art of Persuasion
The Art of PersuasionThe Art of Persuasion
The Art of Persuasion
 
The Art of Persuasion
The Art of PersuasionThe Art of Persuasion
The Art of Persuasion
 
Building A High Performance Network That Works Ed Mayuga Amm Communica...
Building A High Performance Network That Works      Ed Mayuga   Amm Communica...Building A High Performance Network That Works      Ed Mayuga   Amm Communica...
Building A High Performance Network That Works Ed Mayuga Amm Communica...
 
Chesapeake Influence
Chesapeake InfluenceChesapeake Influence
Chesapeake Influence
 
Influence Skillls
Influence SkilllsInfluence Skillls
Influence Skillls
 
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...
Social Engineering: The Art and Science of Engaging Passive Candidates - Glen...
 
Networking for Success Second Edition
Networking for Success Second EditionNetworking for Success Second Edition
Networking for Success Second Edition
 
Continous improvement
Continous improvementContinous improvement
Continous improvement
 
Why and how to network
Why and how to networkWhy and how to network
Why and how to network
 
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And Others
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And OthersJDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And Others
JDD 2016 - Michal Gruca - Continous Improvement, Developing Yourself And Others
 
Bad habits
Bad habitsBad habits
Bad habits
 
CreativeDynamix Networking and Creative Strategy Generation
CreativeDynamix Networking and Creative Strategy GenerationCreativeDynamix Networking and Creative Strategy Generation
CreativeDynamix Networking and Creative Strategy Generation
 
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula Berg
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula BergSocial Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula Berg
Social Fresh Tampa 2011: Revolutionizing Corporate Communication w/ Paula Berg
 
Networking Your Way To Success
Networking Your Way To SuccessNetworking Your Way To Success
Networking Your Way To Success
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

The Art of Hacking a Human

  • 1. SESSION ID: #RSAC Zee Abdelnabi THE ART OF HACKING A HUMAN HUM-W04 In-Vehicle Security Engineer Major Automotive Company @Infosec_17
  • 2. #RSAC The Art of Hacking a Human 2 First Impressions: Based off perceived stereotypes Humans can be programmed: They set up their own internal firewalls with interaction rules Do we want to allow or block this person in our comfort zone?
  • 3. #RSAC Attack Path 3 External reconnaissance – internet searches, social engineering, “dumpster diving” Initial breach (breaking in) – scanning, open ports, services, vulnerable apps, weak protection of data transit Escalate privileges – exploiting a bug, design flaw or configuration, taking advantage of programming errors Persistence – breach undetected for a long period of time
  • 4. #RSAC Attack Path 4 Internal reconnaissance Lateral breach – need users with more access, more admin rights to relevant services and servers Maintain presence Achieve objective
  • 5. #RSAC Reconnaissance 5 Collecting information about an intended human target: Do your research Check their desk Ask around Watch them in the cafeteria Look at previous work history
  • 6. #RSAC Initial Breach: Breaking Into The Human 6 Determine what “operating system” they are running: What patches are in place? What vulnerabilities can you exploit? What “configuration issues” does this person have?
  • 7. #RSAC No Luck: Why? 7 Discover that there are different personality types Learn the different types of personalities Learn to adjust in order to know how to interact with that person
  • 8. #RSAC Understand how People Operate 8 Most people are social creature Most people want to be a part of a group How can you leverage that
  • 9. #RSAC Focus On You 9 The way you view things Why you don’t like them The way you communicate can change how you get along “Be kind, for everyone you meet is fighting a hard battle.” ~ Ian MacLaren
  • 11. #RSAC Altering Perceptions 11 Different points of view will differ from the location and perception of the Subject.
  • 12. #RSAC Escalate Privileges 12 Taking advantage of their flaws. Persuade the Target: Demonstrate Honesty and Respect By: Meet with them – have a list of things you want to accomplish while on the same team Ask target how you could earn their trust Ask if they need help with assignments Invite to lunch Ask questions pertaining to them
  • 13. #RSAC Ego Defense Mechanisms 13 Different defense mechanisms helps identify the person. Lash out: Get protective to protect their pride even though they know they’re wrong No insight they are wrong. Or, they know there is a chance they could be wrong, but they won’t admit wrong
  • 14. #RSAC Micro Expressions 14 Clues people give up are on their face; impossible to control. If you can read these clues, you’ll understand where the conversation is going Are you connecting? Are they comfortable?
  • 15. #RSAC The Reason They Don’t Like You 15 May not be valid Could be stereotypes Break those stereotypes
  • 16. #RSAC Persistence 16 Will not happen overnight; it is a gradual process. Find a mentor and ask for advice Network using target’s mutual friends
  • 17. #RSAC Lateral Breach 17 A hacker will need more intelligence that come from data points. Mutual friends
  • 18. #RSAC Achieve Objective 18 As a User, you will be able to work with different Personalities based on what the Hacking results tell you
  • 19. #RSAC The Bad Boss 19 Goes by the book and micromanages. Acts a certain way because they have not been shown respect and have received negative feedback. Difficult to beat in a match, you can’t just flip the board and walk away.
  • 21. #RSAC 8 Types Of Leaders 21
  • 22. #RSAC Throughout The Hacking Process 22 Remember that communication is the key If you cannot help somebody at least don’t hurt them “People fail to get along because they fear each other; they fear each other because they don't know each other; they don't know each other because they have not communicated with each other.” ~ The Dalai Lama
  • 23. #RSAC Winning The Hacking Game 23 Respecting all religious traditions Exploiting and bullying will never win you any real friends Kindness and compassion will give rise to self confidence, which empowers you to be honest, truthful and transparent.
  • 24. #RSAC We Are All The Same 24 “And while on a secondary level differences exist of nationality, faith, family background, social status and so on, more important is that on a human level we are the same. None of us wants to face problems, and yet we create them by stressing our differences. If we see each other just as fellow human beings, there'll be no basis for fighting or conflict between us.” ~ The Dalai Lama
  • 25. #RSAC You Are Confined By The Walls You Build 25 Look at yourself, the stereotypes people notice The way you talk to people Your perceptions Do you let the way people treat you become the way you treat others
  • 26. #RSAC You Attract 26 The only time someone can drive you crazy is if you are willing to be their passenger. Reciprocal socialization: This is what parents to do teach their kids to be adults. Employees: The way you talk is the way you want to be treated Socialization – negative/positive Any Company – Employees – Different Personalities – Success
  • 27. #RSAC
  • 28. #RSAC Apply 28 This talk will help you realize that sometimes we are the problem and not that other person. Learn to gather your information about that person before jumping to conclusions of why they don’t like you. Look at the cultural environment you are in, is this why that person is the way they are? Use technical and non-technical techniques to get along better with people. Use positive energy
  • 29. #RSAC Apply 29 Look at the way you treat others. Understand how people operate. Be able to understand different personalities based on somebody's micro expressions, ego defense mechanism and understand that the way you socialize with people sets boundaries and limits on how they interact with you