SlideShare a Scribd company logo
1 of 36
Social Engineering Trickx
Michael Hendrickx
Doha, Qatar. 23 Nov 2015
$ whoami
• Michael Hendrickx
– Security Analyst in HelpAG
– Working in infosec for past decade
– mhendrickx@owasp.org
– Belgian
Social Engineering
• You have a firewall, good for you.
– Let’s target the users, not systems
• Human beings are helpful by nature
• Defined as:
“Any act that influences a person to take an action
that may or may not be in their best interest”
Find people Find Info Get access
Finding people
• 2 Ways of finding people:
– Phishing (casting a net)
• Quantity over quality
• Very noisy
– Spear phishing (targeted)
• Quality over quantity
• Takes more time, more effort
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Recent “Rombertik” malware:
- State of the art malware (evil though)
- 97% of code never called
- sandbox confusion
- browser snooping
- MBR destruction upon debug-detection
- Lame Ineffective distribution
Finding people: phishing
• Phishing not always best option
– Very noisy
– ISP / Hosting company may block you
– Too many recipients
• Somebody is bound to report it
Spear phishing is a better option
Finding people: spear phishing
• Email from somebody
who “knows you”
– You probably know them too
• Somebody who took
time to research you
• Interested in you
– Rather, what you know
– Who you know
– What you have access to.
Finding people
• Target a domain, find its users:
– Maltego, theHarvester, metasploit, recon-ng
Emails are probably:
firstname.lastname@helpag.com
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
https://ae.linkedin.com/in/nsolling
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
Let’s dig just a bit further….
https://ae.linkedin.com/in/nsolling
Study the target: Nicolai Solling
Study the target: Nicolai Solling
We know Nicolai’s writing style
More target studying
• Examine digital footprint
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Interests:
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL550
• Trivial Pursuit
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL55
• Trivial Pursuit
So far, what do we know?
• Nicolai’s contact details
– Email address
• Who he knows / might know
– His social network
– School, hobby groups, …
• What he likes
– His interests
• How he writes
And what can we do?
• Target Nicolai:
– “Hi, we met at Porsche club, ManAge spa…”
– “Your 2013 Mercedes GL550 service is due, …”
• Or, pretend to be Nicolai
– Target his contacts / colleagues
(firstname.lastname@helpag.com)
– We know his writing style
– Exploit their trust
How can we do it?
• Need to trick target to
“believe us”
• Let technology help us
• Abuse 33 year old protocol
– Domain squatting
– Fake email threads
– Fake CC
Domain Squatting
• Using “similar” domain for bad purposes
– Homoglyphs, repetition, transposition…
– Use DNSTwist
Original* helpag.com
...
Homoglyph heipag.com
Homoglyph he1pag.com
Homoglyph helpaq.com
...
Transposition heplag.com
...
Increase credibility
• Make your email as legit as possible
• Email footer?
– Annoy somebody till they email you back 
Fake Email Threads
• SMTP just sends text
to a program.
– “Email threads” have no
connection.
– Unless we have the entire
thread, digitally signed, we
can’t trust it at all
– Modern equivalent of
saying:
“Can I go dad? Mom said I
could go”
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• To, CC and BCC does
the same thing
(SMTP wise)
• SMTP sends the
message to every
recipient
Putting it all together
Fake email thread
Fake CC
Domain spoofing
Same writing style
Get access
• Invite user to visit URL
– New intranet portal, survey, …
– Capture domain credentials
• Through basic auth popup
(many think it’s the proxy)
• Through a webpage
– Make site seem as real as possible (logo, …)
– Show the domain name filled in
Get access: phishing site
Or, deliver malware
• Choose distribution method:
– Exe, pif, cmd, scr: probably blocked
– PDF, Office macro, .. : probably allowed
Lessons learned
• Awareness is key
• Minimize digital footprint
– The more people know about
you, the more they can trick you.
• Use digital signatures
• Don’t trust anything sent to you.
Questions?
Thank you!
@ndrix
mhendrickx@owasp.org

More Related Content

Similar to Social Engineering Trickx - Owasp Doha 2015

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling Paul Slack
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursMattan Griffel
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter4Good.org
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersKurt Shaver
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyNelly Yusupova
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...Susanna Frazier
 

Similar to Social Engineering Trickx - Owasp Doha 2015 (20)

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Linked in this misunderstood goldmine
Linked in this misunderstood goldmineLinked in this misunderstood goldmine
Linked in this misunderstood goldmine
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 Hours
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More Customers
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more Effectively
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Turn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar ClassTurn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar Class
 
Linked In 0612
Linked In 0612Linked In 0612
Linked In 0612
 
The future of content
The future of contentThe future of content
The future of content
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Social Engineering Trickx - Owasp Doha 2015

  • 1. Social Engineering Trickx Michael Hendrickx Doha, Qatar. 23 Nov 2015
  • 2. $ whoami • Michael Hendrickx – Security Analyst in HelpAG – Working in infosec for past decade – mhendrickx@owasp.org – Belgian
  • 3. Social Engineering • You have a firewall, good for you. – Let’s target the users, not systems • Human beings are helpful by nature • Defined as: “Any act that influences a person to take an action that may or may not be in their best interest” Find people Find Info Get access
  • 4. Finding people • 2 Ways of finding people: – Phishing (casting a net) • Quantity over quality • Very noisy – Spear phishing (targeted) • Quality over quantity • Takes more time, more effort
  • 5. Finding people: phishing • People haven’t changed much
  • 6. Finding people: phishing • People haven’t changed much
  • 7. Finding people: phishing • People haven’t changed much
  • 8. Finding people: phishing • People haven’t changed much
  • 9. Finding people: phishing • People haven’t changed much
  • 10. Finding people: phishing • People haven’t changed much
  • 11. Finding people: phishing • People haven’t changed much Recent “Rombertik” malware: - State of the art malware (evil though) - 97% of code never called - sandbox confusion - browser snooping - MBR destruction upon debug-detection - Lame Ineffective distribution
  • 12. Finding people: phishing • Phishing not always best option – Very noisy – ISP / Hosting company may block you – Too many recipients • Somebody is bound to report it Spear phishing is a better option
  • 13. Finding people: spear phishing • Email from somebody who “knows you” – You probably know them too • Somebody who took time to research you • Interested in you – Rather, what you know – Who you know – What you have access to.
  • 14. Finding people • Target a domain, find its users: – Maltego, theHarvester, metasploit, recon-ng Emails are probably: firstname.lastname@helpag.com
  • 15. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … https://ae.linkedin.com/in/nsolling
  • 16. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … Let’s dig just a bit further…. https://ae.linkedin.com/in/nsolling
  • 17. Study the target: Nicolai Solling
  • 18. Study the target: Nicolai Solling We know Nicolai’s writing style
  • 19. More target studying • Examine digital footprint
  • 20. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Interests: • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL550 • Trivial Pursuit
  • 21. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL55 • Trivial Pursuit
  • 22. So far, what do we know? • Nicolai’s contact details – Email address • Who he knows / might know – His social network – School, hobby groups, … • What he likes – His interests • How he writes
  • 23. And what can we do? • Target Nicolai: – “Hi, we met at Porsche club, ManAge spa…” – “Your 2013 Mercedes GL550 service is due, …” • Or, pretend to be Nicolai – Target his contacts / colleagues (firstname.lastname@helpag.com) – We know his writing style – Exploit their trust
  • 24. How can we do it? • Need to trick target to “believe us” • Let technology help us • Abuse 33 year old protocol – Domain squatting – Fake email threads – Fake CC
  • 25. Domain Squatting • Using “similar” domain for bad purposes – Homoglyphs, repetition, transposition… – Use DNSTwist Original* helpag.com ... Homoglyph heipag.com Homoglyph he1pag.com Homoglyph helpaq.com ... Transposition heplag.com ...
  • 26. Increase credibility • Make your email as legit as possible • Email footer? – Annoy somebody till they email you back 
  • 27. Fake Email Threads • SMTP just sends text to a program. – “Email threads” have no connection. – Unless we have the entire thread, digitally signed, we can’t trust it at all – Modern equivalent of saying: “Can I go dad? Mom said I could go”
  • 28. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 29. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 30. Fake CC • To, CC and BCC does the same thing (SMTP wise) • SMTP sends the message to every recipient
  • 31. Putting it all together Fake email thread Fake CC Domain spoofing Same writing style
  • 32. Get access • Invite user to visit URL – New intranet portal, survey, … – Capture domain credentials • Through basic auth popup (many think it’s the proxy) • Through a webpage – Make site seem as real as possible (logo, …) – Show the domain name filled in
  • 34. Or, deliver malware • Choose distribution method: – Exe, pif, cmd, scr: probably blocked – PDF, Office macro, .. : probably allowed
  • 35. Lessons learned • Awareness is key • Minimize digital footprint – The more people know about you, the more they can trick you. • Use digital signatures • Don’t trust anything sent to you.