SlideShare a Scribd company logo
1 of 21
Download to read offline
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 1 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
Ethical Hacking
Module IX
Social Engineering
Ethical Hacking (EH)
Module IX: Social Engineering
Exam 312-50 Ethical Hacking and Countermeasures
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 2 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Module Objective
What is Social Engineering?
Common Types of Attacks
Social Engineering by Phone
Dumpster Diving
Online Social Engineering
Reverse Social Engineering
Policies and Procedures
Employee Education
Module Objectives
If you have seen the movie ‘War Games’, then you have already seen social engineering in action.
Arguably one the best ‘social engineers’ around, Kevin Mitnick’s story captured on the celluloid,
shows the art of deception.
In this module, you will get an overview of:
• What Social Engineering is,
• The Common Types of Attack,
• Social Engineering by Phone,
• Dumpster Diving,
• Online Social Engineering,
• Reverse Social Engineering,
• Policies and Procedures and
• Educating Employees.
It must be pointed out that the information contained in this chapter is for the purpose of
overview alone. While it points out fallacies and advocates effective countermeasures, the
possible ways to extract information from another human being is only restricted by the
ingenuity of the cracker’s mind. While this aspect makes it an ‘art’ and the psychological nature
of some of these techniques make it a ‘science’, the bottom line is that there is no one defense
against social engineering and only constant vigil can circumvent some of these overtures.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 3 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
What is Social Engineering?
Social Engineering is the human side of
breaking into a corporate network.
Companies with authentication processes,
firewalls, virtual private networks and network
monitoring software are still wide open to
attacks
An employee may unwittingly give away key
information in an email or by answering
questions over the phone with someone they
don't know or even by talking about a project
with co workers at a local pub after hours.
It is said that security is only as strong as the weakest link. Social engineering is the human side of
breaking into a corporate network. It need not be restricted to corporate networks alone – though
it is where the impact is felt more strongly. It does not matter if enterprises have invested in high
end infrastructure and security solutions such as complex authentication processes, firewalls,
VPNs and network monitoring software, if an employee unwittingly gives away key information in
an email, by answering questions over the phone with a stranger or new acquaintance or even
brag about a project with coworkers at a local pub after hours.
Most often, people are not even aware of the security lapse made by them albeit inadvertently.
Crackers take special interest in developing social engineering skills and can be so proficient that
their victims would not even realize that they have been scammed. Despite having security
policies in place within the organization, organizations are compromised because this aspect of
attack preys on the human impulse to be kind and helpful.
People have been conditioned not to be overtly suspicious that they associate certain behavior and
appearance to known entities. For instance, on seeing a man dressed in brown and stacking a
whole bunch of boxes in a cart, people will hold the door open because they think it is the delivery
man. Attackers are always looking for new ways to get information. They will ensure that they
know the perimeter and the people on the perimeter - security guards, receptionists and help desk
workers - to exploit human oversight
Some companies list employees by title and give their phone number and email address on the
corporate Web site. Alternatively, a corporation may put advertisements in the paper for high-
tech workers who trained on Oracle databases or UNIX servers. These little bits of information
help crackers know what kind of system they're tackling.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 4 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Art of Manipulation.
Social Engineering is the acquisition of sensitive
information or inappropriate access privileges
by an outsider, based upon building of
inappropriate trust relationships with
outsiders.
The goal of a social engineer is to trick someone
into providing valuable information or access to
that information.
It preys on qualities of human nature, such as
the desire to be helpful, the tendency to trust
people and the fear of getting in trouble.
Social engineering is the art and science of getting people to comply with a cracker’s wishes. It is
not a way of mind control, and it does not allow the cracker to get people to perform tasks wildly
outside of their normal behavior. Above all, it is not foolproof. Yet, this is one way most crackers
get a foot into the corporation. There are two terms that are of interest here.
• Social engineering is hacker jargon for getting needed information from a person rather
than breaking into a system.
• Psychological subversion is the term for using social engineering over an extended period
of time to maintain a continuing stream of information and help from unsuspecting
users.
Let us look at a sample scenario.
Cracker: "Good morning Ma’am, I am Bob, I am would like to speak with Ms. Alice"
Alice: "Hello, I am Alice"
Cracker: "Good morning Ma’am, I am calling from the data center, I am sorry I am calling you so
early..."
Alice:" Uh, data center office, well, I was having breakfast, but it doesn't matter"
Cracker: "I was able to call you because of the personal data form you filled when creating your
account." (with eye-blinking tone)
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 5 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
Alice: "My pers.. oh, yes"
Cracker: "I have to inform you that we had a mail server crash tonight, and we are trying to
restore all corporate users’ mail. Since you are a remote user, we are clearing your problems first."
Alice: "A crash? Is my mail lost?"
Cracker: "Oh no, Ma’am, we can restore it. But, since we are datacenter employees, and we are not
allowed to mess with the corporate office user's mail, we need your password; otherwise we
cannot take any action"(first try, probably unsuccessful)
Alice: "Er, my password? Well..."
Cracker: "Yes, I know, you have read on the license agreement that we will never ask for it, but it
was written by the legal department, you know, all law stuff for compliance. (effort to gain
victim's trust)
Cracker: Your username is AliceDxb, isn't it? Corporate sys dept gave us your username and
telephone, but, as smart as they are, not the password. See, without your password nobody can
access your mail, even we at the datacenter. But we have to restore your mail, and we need access.
You can be sure we will not use your password for anything else, well, we will forget it." (smiling)
Alice: "Well, it's not so secret (also smiling! It’s amazing...), my pass is xxxxxx"
Cracker: "Thank you very much, Ma’am. We will restore your mail in a few minutes"
Alice: "But no mail is lost, isn't it?"
Cracker: "Absolutely, Ma’am. You should not experience any problems, but do not hesitate to
contact us just in case. You will find contact numbers on the Intranet"
Alice: "Thanks, you are very efficient, goodbye"
Cracker: "Goodbye"
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 6 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Human Weakness
People are usually the
weakest link in the security
chain.
A successful defense depends
on having good policies in
place and educating
employees to follow the
policies.
Social Engineering is the
hardest form of attack to
defend against because it
cannot be defended with
hardware or software alone.
Social engineering concentrates on the weakest link of the computer security chain. It is
often said that the only secure computer is an unplugged one. The fact that you could persuade
someone to plug it in and switch it on means that even powered down computers is vulnerable.
Anyone with access to any part of the system, physically or electronically is a potential security
risk. Any information that can be gained may be used for social engineering further information.
This means even people not considered as part of a security policy can be used to cause a security
breach. Security professionals are constantly being told that security through obscurity is very
weak security. In the case of social engineering it is no security at all. It is impossible to obscure
the fact that humans use the system or that they can influence it.
Attempting to steer an individual towards completing desired task can use several methods. The
first and most obvious is simply a direct request, where an individual is asked to complete the task
directly. Although least likely to succeed, this is the easiest method and the most straightforward.
The individual knows exactly what is wanted of them. The second is by creating a contrived
situation which the individual is simply a part of. With more factors than just the request to
consider, the individual concerned is far more likely to be persuaded, because the cracker can
create reasons for compliance other than simply personal ones. This involves far more work for
the person making the attempt at persuasion, and almost certainly involves gaining extensive
knowledge of the 'target'. This does not mean that situations do not have to be based in fact. The
less untruths the better.
One of the essential tools used for social engineering is a good memory for gathered facts. This is
something that hackers and sysadmins tend to excel in, especially when it comes to facts relating
to their field.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 7 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Common Types of Social Engineering
Social Engineering can be
broken into two types:
human based and computer
based
1. Human-based Social
Engineering refers to
person to person
interaction to retrieve the
desired information.
2. Computer based Social
Engineering refers to
having computer software
that attempts to retrieve the
desired information.
Social Engineering can be broadly divided into two types: human based and computer based.
Human based social engineering involves human interaction in one manner or the other.
Computer based engineering depend on software to carry out the task at hand.
Gartner notes six human behaviors for positive response for social engineering. Corroborate this
with the traits discussed in module one of the course.
Reciprocation Someone is given a "token" and
feels compelled to take action.
You buy the wheel of cheese when
given a free sample.
Consistency Certain behavior patterns are
consistent from person to
person.
If you ask a question and wait, people
will be compelled to fill the pause.
Social Validation Someone is compelled to do
what everyone else is doing.
Stop in the middle of a busy street and
look up; people will eventually stop and
do the same.
Liking People tend to say yes to those
they like, and also to attractive
people.
Attractive models are used in
advertising.
Authority People tend to listen and heed
the advice of those in a position
of authority.
"Four out of five doctors
recommend...."
Scarcity If someone is in low supply, it
becomes more "precious" and,
therefore, more appealing.
Furbees or Sony Playstation 2.
Source: Gartner Research
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 8 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
The social engineering cycle can be seen as four distinct phases.
Information
Gathering
Development
of
Relationship
Exploitation
of
Relationship
Execution
to Achieve
Objective
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 9 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Human based - Impersonation
Human based social
engineering techniques can
be broadly categorized into:
Impersonation
Posing as Important User
Third-person Approach
Technical Support
In Person
• Dumpster Diving
• Shoulder Surfing
Impersonation – This is a popular social engineering technique often seen depicting the
cracker as impersonating an employee resorting to an out of the normal method to gain access to
privileges. It is not the only portrayal though. Other examples such as a ‘friend’ of an employee
accosting a colleague to retrieve information needed by the employee in sick bed, and using it for
further social engineering etc. There is a well-recognized rule in social interactions that a favor
begets a favor even if it were offered without any request from the obtainer. This truth is known as
reciprocation. Reciprocation is seen constantly in the corporate environment. An employee will
help out another with the expectation that, eventually, the favor will be returned. Social engineers
try to take advantage of this social trait in impersonation. The possibilities are endless and only
limited by imagination. Few employees question a personal visit from a repairman, IS support
person, a contractor, or a cleaning person. These ruses have been used in the past also as a
disguise to gain physical access. A great deal of information can be gleaned from the tops of desks,
the trash or even phone directories and nameplates.
Important User – Impersonation is taken to a higher degree by assuming the identity of an
important employee in order to add an element of intimidation. The reciprocation factor also
plays a role in that a lower level employee would go out of the way to help a higher order
employee so that his favor gets him the attention needed to help him out in the corporate
environment. Another behavioral trigger that aids a social engineer is the implicit nature not to
question authority. People will do an out-of-the-turn routine for someone who they perceive is in
authority. A cracker posing as an important user (such as vice president, director) can manipulate
an employee who has not been prepared very easily. This trigger is assumes greater significance
by the reality that it is considered a challenge to even verify the legitimacy of the authority. This
lack of perspective by employees makes it easy for anyone willing to misrepresent him or herself
as an authority figure. For example, a help desk employee is less likely to turn down the request of
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 10 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
a Vice President who says he has very little time to get some important information he needs for a
meeting and needs to access resources. The social engineer use authority to intimidate or may
even threaten to report the employee to their supervisor if they do not provide the information
required.
Third-party Authorization – Another popular social engineering technique is for the cracker
to present self to a resource claiming that he has the approval of the designated authority. For
instance, on knowing who is responsible to grant access to desired information, the cracker might
keep tabs on him and use his absence as leverage to access resources. He might approach the help
desk or other personnel claiming he has approval to access information. This can be particularly
effective if the person is on vacation or out of town – where verification is not instantly possible.
People have a tendency to follow through with commitments in the workplace – even if they are
suspicious that the request may not have been legitimate. This tendency is so strong that people
will fulfill the commitments that they believe were made by their fellow employees. People have a
tendency to believe that others are expressing their true attitudes when they make a statement.
Unless there is strong evidence to the contrary, people will believe that the person with whom
they are talking is telling the truth about what they feel or need.
Passing off as technical support – an often used tactic - especially when the victim is not
proficient on technical areas. The cracker may pose as a hardware vendor or technician or a
computer related supplier and approach the victim. One demonstration at a hacker meet had the
speaker calling up Starbucks and asking the employee if his broadband connection was working
fine. The perplexed employee replies that it is the modem which was giving them trouble. The
hacker went on to make him read out the credit card number of the last transaction – without
giving any credentials. In the corporate scenario, the cracker may ask employees to part with their
login information including password to sort out a non-existent problem.
In Person – The cracker might actually try to visit the target site and physically survey for
information. He may disguise himself as courier delivery person, janitor, mailman or even hang
out as a visitor in the lobby. He can pose as a businessman, client or technician. Once inside, he
can look for passwords stuck on terminals, find important data lying on desks or overhear
confidential conversations. There are two other techniques known for their use by crackers. These
are:
• Dumpster Diving – This refers to looking through an organization’s trash for valuable
information.
• Shoulder Surfing – Looking over someone’s shoulder to try to see what they are typing as
they enter their password.
Once inside, the intruder has a whole menu of tactics to choose from, including wandering the
halls of the building looking for the Holy Grail--vacant offices with employees' login names and
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 11 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
passwords attached to their PCs; going to the mail room to insert forged memos (on forms or
letterhead recovered from the trash or during an earlier foray) in to the corporate mail system;
attempting to gain physical access to a server or telephone room to get more information on the
systems in use; finding dial-in equipment and noting the telephone numbers (which are probably
written on the jacks); placing a protocol analyzer in a wiring closet to capture data, user names,
and passwords (remember that when telnet is used with Unix-based systems on the other end,
login names and passwords are not encrypted) or simply stealing targeted information.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 12 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Example
In 1998, crackers discovered a security lapse in America Online that has yielded access to
subscriber and AOL staff accounts in at least some instances, giving them free rein to alter or
deface company pages or subscriber profiles.
It is said that more than one person--equipped with user information such as screen name, real
name, and address--has been able to call support lines and persuade some customer service
representatives to reset an unsuspecting user's password. The attacker then armed with a new
password, gained exclusive access to the account.
The hacker, who went by the screen name "PhatEndo," convinced an AOL representative that he
was the remote staff member who had publishing privileges in the ACLU's AOL site. He got
ACLU’s account by calling AOL, pretending to be the account owner, and had the password reset.
What was alarming was that he didn't even give the account owner's name.
The help desk employees should be trained on attending calls from "employees" coming in on
outside lines. This can be identified by most PBX systems. Help-desk personnel must be made
aware of these indicators and trained to be suspicious of such calls, limiting information given
until the caller is properly identified.
Help-desk staffers should verify the identity of all employees before addressing their problems or
questions. One way to do this is to check a company phone book and call the employee back
before working with him or her. Another is to assign each employee a personal identification
number (PIN) that must be given before support is offered. Calls regarding password changes are
a security mine field.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 13 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Example
In June 2000, Larry Ellison, the Oracle chairman, admitted that Oracle had resorted to dumpster
diving in an attempt to unearth information about Microsoft in the federal antitrust case. Named
‘larrygate’, this was not something new in corporate espionage. In 1993, Microsoft had done the
same to produce evidence against a company that made pirate copies of its software. While two
wrongs don’t make a right; on the cracking scene, crackers love to go "trashing" to find documents
that help them piece together the structure of the company, provide clues about what kinds of
computer systems used, and most important, obtain the names, titles, and telephone numbers of
employees.
Let us look at some of the interesting things a dumpster can yield:
• Company phone books - Knowing who to call and whom to impersonate are the first steps
to gaining access to sensitive data. It helps to have the right names and titles to sound as a
legitimate employee. Finding dial-in access numbers is an easy task when a cracker can
ascertain the telephone exchange of the company from the phone book.
• Organizational charts; memos; company policy manuals; calendars of meetings, events,
and vacations; system manuals; printouts of sensitive data or login names and
passwords; printouts of source code; disks and tapes; company letterhead and memo
forms; outdated hard drives.
These items provide a wealth of information to crackers. There are some countermeasures against
dumpster diving resulting in useful material.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 14 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
Use a paper shredder to prevent a cracker from gaining any printed information. Make sure all
magnetic media discarded is bulk erased--data can be retrieved from formatted disks and hard
drives. Dumpsters should be kept in secured areas.
In a real life scenario, a private detective agency was able to obtain a classified report from a
corporation by resorting to dumpster diving that unearthed a company phone book. With a few
phone calls, the team was able to identify the concerned person authorized and also to request the
report they wanted from the person whose job was to help users get reports.
Company memo forms, also taken from the trash, were used to prepare a properly formatted
request (with the help of the unwitting staffer). These were dropped into the company mail during
a quick venture into the building by the infiltrator disguised as a courier. Finally, the crackers
called the concerned department to let the staff know that the report would be picked up by a
courier--who then walked out the door with the multi-thousand-page report. It's important to
note that the crackers did not even have to physically access the company's computer systems.
You can prevent this type of activity with some of the following countermeasures:
• Require that all visitors are to be escorted at all times;
• Instruct employees to report any repair people that show up without being called, and to
not grant access to equipment until the workers' identities are established;
• Keep wire closets, server rooms, phone closets, and other locations containing sensitive
equipment locked at all times;
• Keep an inventory of the equipment that is supposed to be in each server room, wire
closet, and so on. Periodically check for extra or missing equipment.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 15 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Computer Based Social Engineering
These can be divided into
the following broad
categories:
Mail / IM attachments
Pop-up Windows
Websites / Sweepstakes
Spam Mail
At a large e-business enterprise, during an after hours Internet chat session, an employee was
asked for a picture of himself. Although he didn't have one available, he obligingly asked for a
photo from the other party. After a bit of additional encouragement, the other party agreed,
sending an attachment that, in all respects, resembled a JPEG file. Upon accessing the attachment
the hard drive started spinning, and of course, there was no photo.
Fortunately, the employee was sophisticated enough to understand the danger of a Trojan horse
being enclosed, and immediately alerted the IT department, who terminated the Internet
connection. Later investigations revealed that the computer was infected with SubSeven, the most
powerful backdoor at that time. Eventually, the company reinstalled the computer, rolled back to
the day before with a backup tape (losing a full day of online orders), and stayed offline for three
full days overall.
Computer-based social engineering use software to retrieve information.
Popup Windows – A window will appear on the screen telling the user that he has lost his network
connection and needs to reenter their user name and password. A program previously installed by
the intruder will then email the information back to a remote site.
Mail Attachments – The use of a topical subject to trigger an emotion which leads to unwitting
participation from the target. There are two common forms that may be used. The first involves
malicious code, such as that used to create a virus. This code is usually hidden within a file
attached to an email. The intention is that an unsuspecting user will click/open the file; for
example, 'IloveYou' virus, 'Anna Kournikova' worm (It also is an example of how Social Engineers
try to hide the file extension by giving the attachment a long file name. In this case, the
attachment is named AnnaKournikova.jpg.vbs. If the name is truncated it will look like a jpg file
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 16 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
and the user will not notice the .vbs extension) or more recently the 'Vote-A' email were worm.
The second equally effective approach involves chain mail and Virus hoaxes. These have been
designed to clog mail system by reporting a non existent virus or competition and requesting the
recipient to forward a copy on to all their friends and co-workers. As history has shown, this can
create a significant snowball effect once started.
Websites – A ruse used to get an unwitting user to disclose potentially sensitive data, such as the
password they use at work. For example, a website may promote a fictitious competition or
promotion, which requires a user to enter in a contact email address and password. The password
entered may very well be similar to the password used by the individual at work. A common trick
is to offer something free or a chance to win a sweepstakes on a website. Many employees will
enter the same password that they use at work, so the Social Engineer now has a valid user name
and password to enter an organization’s network.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 17 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Reverse Social Engineering
More advanced method of gaining illicit
information is known as "reverse social
engineering"
This is when the hacker creates a persona that
appears to be in a position of authority so that
employees will ask him for information, rather
than the other way around.
The three parts of reverse social engineering
attacks are sabotage, advertising and assisting.
Generally, reverse social engineering is the most difficult to carry out. This is primarily because it
takes a lot of preparation and skill to execute.
The social engineer will assume the role of a person of authority, and have the employees
asking him for information. The hacker usually manipulates the types of questions asked so he
can draw out the information required. Preliminarily the social engineer will cause some incident
creating a problem, then presents himself as the solver of the problem and through general
conversation; he encourages employees to ask questions as well. As an example, an employee
may ask about how this problem has affected particular files, or servers or equipment. This
provides pertinent information to the social engineer. A lot of different skills and experiences are
required to carry this tactic off well.
Sabotage - After gaining simple access, the attacker either corrupts the workstation or gives it an
appearance of being corrupted. The user of the system discovers the problem and tries to seek
help
Marketing - In order to ensure the user calls the attacker, the attacker must advertise. The
attacker can do this by either leaving their business cards around the target's office and/or by
placing their contact number on the error message itself
Support - Finally, the attacker would assist with the problem, ensuring that the user remains
unsuspicious while the attacker obtains the information they require.
The "My Party" e-mail worm is an example of a "reverse social engineering" virus. Reverse social
engineering viruses do not rely on sensational subject lines, such as AnnaKournikova or Naked
Wife, to tempt users. Instead, reverse social engineering viruses use innocuous sounding subject
lines and realistic attachment names.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 18 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Policies and Procedures
Policy is the most critical component to any
information security program.
Good policies and procedures are not effective if
they are not taught and reinforced to the
employees.
They need to be taught to emphasize their
importance. After receiving training, the
employee should sign a statement
acknowledging that they understand the
policies.
No software or hardware security solutions can truly secure a corporate computing
environment unless there is a sound security policy. These should be clearly articulated to the
users such as acceptable use policy, Internet use policy and the like. The security policy sets the
standards and level of security a corporate network will have. It also gives the network a security
posture that can serve as a benchmark.
This is even more critical when the security policy is formulated keeping in mind the threat the
network faces from social engineering. The security policy can provide guidelines to users who
are in a quandary when confronted by a cracker’s con. The policy can point directions to users on
whether or not certain information can be given out. This should be well defined in advance by
people who have seriously contemplated about the value of such information.
Increasing employee confidence by laying out clear policies decreases the chance of the attacker
wielding undue influence on an employee. The security policy must address a number of areas in
order to be a foundation for social engineering resistance such as information access controls,
setting up accounts, access approval and password changes. It should also deal with locks, ID’s,
paper shredding, and escorting of visitors. The policy must have discipline built in and, above all,
it must be enforced. The policies have a balancing effect in that the user besotted will not go out of
his way and assume a different role when interacting with the cracker in person or on the phone.
The policy also sets responsibility for information or access that is given out so that there is no
question as to the employee’s own risk when giving away privileged information or access. The
users must be able to recognize what kind of information a social engineer can use and what kinds
of conversations should be considered suspicious. Users must be able to identify confidential
information and understand their responsibility towards protecting the same. They also need to
know when and how to refuse information from an inquirer with assurance of management
backing.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 19 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Security Policies - Checklist
Account Setup
Password change policy
Help desk procedures
Access Privileges
Violations
Employee identification
Privacy Policy
Paper documents
Modems
Physical Access Restrictions
Virus control
• Account Setup: There should be an appropriate security policy that new employees can
familiarize themselves with regarding their responsibility and use of the computing
infrastructure.
• Password change policy: The password policy should explicitly state that employees are
required to use strong passwords and encouraged to change them frequently. They should
be made aware of the security implication in case their password is stolen or copied by
their mishandling of its storage.
• Help Desk procedures: There must be a standard procedure for employee verification
before the help desk is allowed to give out passwords. A caller id system on the phone is a
good start so the help desk can identify where the call originates. The procedure could
also require that the help desk call the employee back to verify his location. Another
method would be to maintain an item of information that the employee would be
required to know before the password was given out. Some organizations do not allow
any passwords to be given out over the phone. The help desk must also know who to
contact in case of security emergencies.
• Access Privileges: There should be a specific procedure in place for how access is granted
to various parts of the network. The procedure should state who is authorized to approve
access and who can approve any exceptions.
• Violations: There should be a procedure for employees to use to report any violations to
policy. They should be encouraged to report any suspicious activity and assured that they
will be supported for reporting violation.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 20 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
• Employee Identification: One way is to require employees to wear picture ID badges. Any
guest should be required to register and wear a temporary ID badge while in the building.
Employees should be encouraged to challenge anyone without a badge.
• Privacy Policy. Company information should be protected. A policy should be in place
stating that no one is to give out any more information than is necessary. A good policy
would be to refer all surveys to a designated person. The policy should also contain
procedures for escalating the request if someone is asking for more information than the
employee is authorized to provide.
• Paper Documents: All confidential documents should be shredded.
• Modems. Modems attached to individual computers are a major security risk because
they do not go through the firewall. Policy should not allow any modems attached to a
network computer.
• Physical Access Restriction: Sensitive areas should be physically protected with limited
access. Doors should be locked and access only granted to employees with a business
need.
• Virus Control: Established procedures should be in place to take action and prevent the
spread of any real viruses.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Social Engineering
Module IX Page 21 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council
All rights reserved. Reproduction is strictly prohibited
EC-Council
Summary
Social Engineering is the human side of breaking into a
corporate network.
Social Engineering involves acquiring sensitive
information or inappropriate access privileges by an
outsider.
Human-based Social Engineering refers to person to
person interaction to retrieve the desired information.
Computer based Social Engineering refers to having
computer software that attempts to retrieve the desired
information
A successful defense depends on having good policies in
place and diligent implementation.
Summary
Recap
• Social Engineering is the human side of breaking into a corporate network.
• Social Engineering involves acquiring sensitive information or inappropriate access
privileges by an outsider.
• Human-based Social Engineering refers to person to person interaction to retrieve the
desired information.
• Computer based Social Engineering refers to having computer software that attempts to
retrieve the desired information
• A successful defense depends on having good policies in place and diligent
implementation.

More Related Content

What's hot

Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03kbzdox ivanovich
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 

What's hot (20)

Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Bi
BiBi
Bi
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
Mis3rd
Mis3rdMis3rd
Mis3rd
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 

Similar to Module 9 (social engineering)

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineeringVi Tính Hoàng Nam
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speechtalhaabid
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 

Similar to Module 9 (social engineering) (20)

Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Security
SecuritySecurity
Security
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 

More from Wail Hassan

Physical appearance of the prophet muhammed pbuh
Physical appearance of the prophet muhammed pbuhPhysical appearance of the prophet muhammed pbuh
Physical appearance of the prophet muhammed pbuhWail Hassan
 
Ar raheeq al-makhtum
Ar raheeq al-makhtumAr raheeq al-makhtum
Ar raheeq al-makhtumWail Hassan
 
Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)Wail Hassan
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)Wail Hassan
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)Wail Hassan
 
Module 17 (novell hacking)
Module 17 (novell hacking)Module 17 (novell hacking)
Module 17 (novell hacking)Wail Hassan
 
Module 16 (virus)
Module 16 (virus)Module 16 (virus)
Module 16 (virus)Wail Hassan
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Module 14 (sql injection)
Module 14 (sql injection)Module 14 (sql injection)
Module 14 (sql injection)Wail Hassan
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Wail Hassan
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Wail Hassan
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)Wail Hassan
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)Wail Hassan
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)Wail Hassan
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Wail Hassan
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)Wail Hassan
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)Wail Hassan
 

More from Wail Hassan (20)

Physical appearance of the prophet muhammed pbuh
Physical appearance of the prophet muhammed pbuhPhysical appearance of the prophet muhammed pbuh
Physical appearance of the prophet muhammed pbuh
 
Ar raheeq al-makhtum
Ar raheeq al-makhtumAr raheeq al-makhtum
Ar raheeq al-makhtum
 
Module 21 (cryptography)
Module 21 (cryptography)Module 21 (cryptography)
Module 21 (cryptography)
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
Module 18 (linux hacking)
Module 18 (linux hacking)Module 18 (linux hacking)
Module 18 (linux hacking)
 
Module 17 (novell hacking)
Module 17 (novell hacking)Module 17 (novell hacking)
Module 17 (novell hacking)
 
Module 16 (virus)
Module 16 (virus)Module 16 (virus)
Module 16 (virus)
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Module 14 (sql injection)
Module 14 (sql injection)Module 14 (sql injection)
Module 14 (sql injection)
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Module 8 (denial of service)
Module 8 (denial of service)Module 8 (denial of service)
Module 8 (denial of service)
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Module 3 (scanning)
Module 3 (scanning)Module 3 (scanning)
Module 3 (scanning)
 
Module 2 (footprinting)
Module 2 (footprinting)Module 2 (footprinting)
Module 2 (footprinting)
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Module 9 (social engineering)

  • 1. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 1 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited Ethical Hacking Module IX Social Engineering Ethical Hacking (EH) Module IX: Social Engineering Exam 312-50 Ethical Hacking and Countermeasures
  • 2. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 2 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Module Objective What is Social Engineering? Common Types of Attacks Social Engineering by Phone Dumpster Diving Online Social Engineering Reverse Social Engineering Policies and Procedures Employee Education Module Objectives If you have seen the movie ‘War Games’, then you have already seen social engineering in action. Arguably one the best ‘social engineers’ around, Kevin Mitnick’s story captured on the celluloid, shows the art of deception. In this module, you will get an overview of: • What Social Engineering is, • The Common Types of Attack, • Social Engineering by Phone, • Dumpster Diving, • Online Social Engineering, • Reverse Social Engineering, • Policies and Procedures and • Educating Employees. It must be pointed out that the information contained in this chapter is for the purpose of overview alone. While it points out fallacies and advocates effective countermeasures, the possible ways to extract information from another human being is only restricted by the ingenuity of the cracker’s mind. While this aspect makes it an ‘art’ and the psychological nature of some of these techniques make it a ‘science’, the bottom line is that there is no one defense against social engineering and only constant vigil can circumvent some of these overtures.
  • 3. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 3 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council What is Social Engineering? Social Engineering is the human side of breaking into a corporate network. Companies with authentication processes, firewalls, virtual private networks and network monitoring software are still wide open to attacks An employee may unwittingly give away key information in an email or by answering questions over the phone with someone they don't know or even by talking about a project with co workers at a local pub after hours. It is said that security is only as strong as the weakest link. Social engineering is the human side of breaking into a corporate network. It need not be restricted to corporate networks alone – though it is where the impact is felt more strongly. It does not matter if enterprises have invested in high end infrastructure and security solutions such as complex authentication processes, firewalls, VPNs and network monitoring software, if an employee unwittingly gives away key information in an email, by answering questions over the phone with a stranger or new acquaintance or even brag about a project with coworkers at a local pub after hours. Most often, people are not even aware of the security lapse made by them albeit inadvertently. Crackers take special interest in developing social engineering skills and can be so proficient that their victims would not even realize that they have been scammed. Despite having security policies in place within the organization, organizations are compromised because this aspect of attack preys on the human impulse to be kind and helpful. People have been conditioned not to be overtly suspicious that they associate certain behavior and appearance to known entities. For instance, on seeing a man dressed in brown and stacking a whole bunch of boxes in a cart, people will hold the door open because they think it is the delivery man. Attackers are always looking for new ways to get information. They will ensure that they know the perimeter and the people on the perimeter - security guards, receptionists and help desk workers - to exploit human oversight Some companies list employees by title and give their phone number and email address on the corporate Web site. Alternatively, a corporation may put advertisements in the paper for high- tech workers who trained on Oracle databases or UNIX servers. These little bits of information help crackers know what kind of system they're tackling.
  • 4. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 4 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Art of Manipulation. Social Engineering is the acquisition of sensitive information or inappropriate access privileges by an outsider, based upon building of inappropriate trust relationships with outsiders. The goal of a social engineer is to trick someone into providing valuable information or access to that information. It preys on qualities of human nature, such as the desire to be helpful, the tendency to trust people and the fear of getting in trouble. Social engineering is the art and science of getting people to comply with a cracker’s wishes. It is not a way of mind control, and it does not allow the cracker to get people to perform tasks wildly outside of their normal behavior. Above all, it is not foolproof. Yet, this is one way most crackers get a foot into the corporation. There are two terms that are of interest here. • Social engineering is hacker jargon for getting needed information from a person rather than breaking into a system. • Psychological subversion is the term for using social engineering over an extended period of time to maintain a continuing stream of information and help from unsuspecting users. Let us look at a sample scenario. Cracker: "Good morning Ma’am, I am Bob, I am would like to speak with Ms. Alice" Alice: "Hello, I am Alice" Cracker: "Good morning Ma’am, I am calling from the data center, I am sorry I am calling you so early..." Alice:" Uh, data center office, well, I was having breakfast, but it doesn't matter" Cracker: "I was able to call you because of the personal data form you filled when creating your account." (with eye-blinking tone)
  • 5. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 5 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited Alice: "My pers.. oh, yes" Cracker: "I have to inform you that we had a mail server crash tonight, and we are trying to restore all corporate users’ mail. Since you are a remote user, we are clearing your problems first." Alice: "A crash? Is my mail lost?" Cracker: "Oh no, Ma’am, we can restore it. But, since we are datacenter employees, and we are not allowed to mess with the corporate office user's mail, we need your password; otherwise we cannot take any action"(first try, probably unsuccessful) Alice: "Er, my password? Well..." Cracker: "Yes, I know, you have read on the license agreement that we will never ask for it, but it was written by the legal department, you know, all law stuff for compliance. (effort to gain victim's trust) Cracker: Your username is AliceDxb, isn't it? Corporate sys dept gave us your username and telephone, but, as smart as they are, not the password. See, without your password nobody can access your mail, even we at the datacenter. But we have to restore your mail, and we need access. You can be sure we will not use your password for anything else, well, we will forget it." (smiling) Alice: "Well, it's not so secret (also smiling! It’s amazing...), my pass is xxxxxx" Cracker: "Thank you very much, Ma’am. We will restore your mail in a few minutes" Alice: "But no mail is lost, isn't it?" Cracker: "Absolutely, Ma’am. You should not experience any problems, but do not hesitate to contact us just in case. You will find contact numbers on the Intranet" Alice: "Thanks, you are very efficient, goodbye" Cracker: "Goodbye"
  • 6. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 6 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Human Weakness People are usually the weakest link in the security chain. A successful defense depends on having good policies in place and educating employees to follow the policies. Social Engineering is the hardest form of attack to defend against because it cannot be defended with hardware or software alone. Social engineering concentrates on the weakest link of the computer security chain. It is often said that the only secure computer is an unplugged one. The fact that you could persuade someone to plug it in and switch it on means that even powered down computers is vulnerable. Anyone with access to any part of the system, physically or electronically is a potential security risk. Any information that can be gained may be used for social engineering further information. This means even people not considered as part of a security policy can be used to cause a security breach. Security professionals are constantly being told that security through obscurity is very weak security. In the case of social engineering it is no security at all. It is impossible to obscure the fact that humans use the system or that they can influence it. Attempting to steer an individual towards completing desired task can use several methods. The first and most obvious is simply a direct request, where an individual is asked to complete the task directly. Although least likely to succeed, this is the easiest method and the most straightforward. The individual knows exactly what is wanted of them. The second is by creating a contrived situation which the individual is simply a part of. With more factors than just the request to consider, the individual concerned is far more likely to be persuaded, because the cracker can create reasons for compliance other than simply personal ones. This involves far more work for the person making the attempt at persuasion, and almost certainly involves gaining extensive knowledge of the 'target'. This does not mean that situations do not have to be based in fact. The less untruths the better. One of the essential tools used for social engineering is a good memory for gathered facts. This is something that hackers and sysadmins tend to excel in, especially when it comes to facts relating to their field.
  • 7. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 7 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Common Types of Social Engineering Social Engineering can be broken into two types: human based and computer based 1. Human-based Social Engineering refers to person to person interaction to retrieve the desired information. 2. Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information. Social Engineering can be broadly divided into two types: human based and computer based. Human based social engineering involves human interaction in one manner or the other. Computer based engineering depend on software to carry out the task at hand. Gartner notes six human behaviors for positive response for social engineering. Corroborate this with the traits discussed in module one of the course. Reciprocation Someone is given a "token" and feels compelled to take action. You buy the wheel of cheese when given a free sample. Consistency Certain behavior patterns are consistent from person to person. If you ask a question and wait, people will be compelled to fill the pause. Social Validation Someone is compelled to do what everyone else is doing. Stop in the middle of a busy street and look up; people will eventually stop and do the same. Liking People tend to say yes to those they like, and also to attractive people. Attractive models are used in advertising. Authority People tend to listen and heed the advice of those in a position of authority. "Four out of five doctors recommend...." Scarcity If someone is in low supply, it becomes more "precious" and, therefore, more appealing. Furbees or Sony Playstation 2. Source: Gartner Research
  • 8. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 8 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited The social engineering cycle can be seen as four distinct phases. Information Gathering Development of Relationship Exploitation of Relationship Execution to Achieve Objective
  • 9. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 9 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Human based - Impersonation Human based social engineering techniques can be broadly categorized into: Impersonation Posing as Important User Third-person Approach Technical Support In Person • Dumpster Diving • Shoulder Surfing Impersonation – This is a popular social engineering technique often seen depicting the cracker as impersonating an employee resorting to an out of the normal method to gain access to privileges. It is not the only portrayal though. Other examples such as a ‘friend’ of an employee accosting a colleague to retrieve information needed by the employee in sick bed, and using it for further social engineering etc. There is a well-recognized rule in social interactions that a favor begets a favor even if it were offered without any request from the obtainer. This truth is known as reciprocation. Reciprocation is seen constantly in the corporate environment. An employee will help out another with the expectation that, eventually, the favor will be returned. Social engineers try to take advantage of this social trait in impersonation. The possibilities are endless and only limited by imagination. Few employees question a personal visit from a repairman, IS support person, a contractor, or a cleaning person. These ruses have been used in the past also as a disguise to gain physical access. A great deal of information can be gleaned from the tops of desks, the trash or even phone directories and nameplates. Important User – Impersonation is taken to a higher degree by assuming the identity of an important employee in order to add an element of intimidation. The reciprocation factor also plays a role in that a lower level employee would go out of the way to help a higher order employee so that his favor gets him the attention needed to help him out in the corporate environment. Another behavioral trigger that aids a social engineer is the implicit nature not to question authority. People will do an out-of-the-turn routine for someone who they perceive is in authority. A cracker posing as an important user (such as vice president, director) can manipulate an employee who has not been prepared very easily. This trigger is assumes greater significance by the reality that it is considered a challenge to even verify the legitimacy of the authority. This lack of perspective by employees makes it easy for anyone willing to misrepresent him or herself as an authority figure. For example, a help desk employee is less likely to turn down the request of
  • 10. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 10 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited a Vice President who says he has very little time to get some important information he needs for a meeting and needs to access resources. The social engineer use authority to intimidate or may even threaten to report the employee to their supervisor if they do not provide the information required. Third-party Authorization – Another popular social engineering technique is for the cracker to present self to a resource claiming that he has the approval of the designated authority. For instance, on knowing who is responsible to grant access to desired information, the cracker might keep tabs on him and use his absence as leverage to access resources. He might approach the help desk or other personnel claiming he has approval to access information. This can be particularly effective if the person is on vacation or out of town – where verification is not instantly possible. People have a tendency to follow through with commitments in the workplace – even if they are suspicious that the request may not have been legitimate. This tendency is so strong that people will fulfill the commitments that they believe were made by their fellow employees. People have a tendency to believe that others are expressing their true attitudes when they make a statement. Unless there is strong evidence to the contrary, people will believe that the person with whom they are talking is telling the truth about what they feel or need. Passing off as technical support – an often used tactic - especially when the victim is not proficient on technical areas. The cracker may pose as a hardware vendor or technician or a computer related supplier and approach the victim. One demonstration at a hacker meet had the speaker calling up Starbucks and asking the employee if his broadband connection was working fine. The perplexed employee replies that it is the modem which was giving them trouble. The hacker went on to make him read out the credit card number of the last transaction – without giving any credentials. In the corporate scenario, the cracker may ask employees to part with their login information including password to sort out a non-existent problem. In Person – The cracker might actually try to visit the target site and physically survey for information. He may disguise himself as courier delivery person, janitor, mailman or even hang out as a visitor in the lobby. He can pose as a businessman, client or technician. Once inside, he can look for passwords stuck on terminals, find important data lying on desks or overhear confidential conversations. There are two other techniques known for their use by crackers. These are: • Dumpster Diving – This refers to looking through an organization’s trash for valuable information. • Shoulder Surfing – Looking over someone’s shoulder to try to see what they are typing as they enter their password. Once inside, the intruder has a whole menu of tactics to choose from, including wandering the halls of the building looking for the Holy Grail--vacant offices with employees' login names and
  • 11. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 11 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited passwords attached to their PCs; going to the mail room to insert forged memos (on forms or letterhead recovered from the trash or during an earlier foray) in to the corporate mail system; attempting to gain physical access to a server or telephone room to get more information on the systems in use; finding dial-in equipment and noting the telephone numbers (which are probably written on the jacks); placing a protocol analyzer in a wiring closet to capture data, user names, and passwords (remember that when telnet is used with Unix-based systems on the other end, login names and passwords are not encrypted) or simply stealing targeted information.
  • 12. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 12 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Example In 1998, crackers discovered a security lapse in America Online that has yielded access to subscriber and AOL staff accounts in at least some instances, giving them free rein to alter or deface company pages or subscriber profiles. It is said that more than one person--equipped with user information such as screen name, real name, and address--has been able to call support lines and persuade some customer service representatives to reset an unsuspecting user's password. The attacker then armed with a new password, gained exclusive access to the account. The hacker, who went by the screen name "PhatEndo," convinced an AOL representative that he was the remote staff member who had publishing privileges in the ACLU's AOL site. He got ACLU’s account by calling AOL, pretending to be the account owner, and had the password reset. What was alarming was that he didn't even give the account owner's name. The help desk employees should be trained on attending calls from "employees" coming in on outside lines. This can be identified by most PBX systems. Help-desk personnel must be made aware of these indicators and trained to be suspicious of such calls, limiting information given until the caller is properly identified. Help-desk staffers should verify the identity of all employees before addressing their problems or questions. One way to do this is to check a company phone book and call the employee back before working with him or her. Another is to assign each employee a personal identification number (PIN) that must be given before support is offered. Calls regarding password changes are a security mine field.
  • 13. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 13 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Example In June 2000, Larry Ellison, the Oracle chairman, admitted that Oracle had resorted to dumpster diving in an attempt to unearth information about Microsoft in the federal antitrust case. Named ‘larrygate’, this was not something new in corporate espionage. In 1993, Microsoft had done the same to produce evidence against a company that made pirate copies of its software. While two wrongs don’t make a right; on the cracking scene, crackers love to go "trashing" to find documents that help them piece together the structure of the company, provide clues about what kinds of computer systems used, and most important, obtain the names, titles, and telephone numbers of employees. Let us look at some of the interesting things a dumpster can yield: • Company phone books - Knowing who to call and whom to impersonate are the first steps to gaining access to sensitive data. It helps to have the right names and titles to sound as a legitimate employee. Finding dial-in access numbers is an easy task when a cracker can ascertain the telephone exchange of the company from the phone book. • Organizational charts; memos; company policy manuals; calendars of meetings, events, and vacations; system manuals; printouts of sensitive data or login names and passwords; printouts of source code; disks and tapes; company letterhead and memo forms; outdated hard drives. These items provide a wealth of information to crackers. There are some countermeasures against dumpster diving resulting in useful material.
  • 14. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 14 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited Use a paper shredder to prevent a cracker from gaining any printed information. Make sure all magnetic media discarded is bulk erased--data can be retrieved from formatted disks and hard drives. Dumpsters should be kept in secured areas. In a real life scenario, a private detective agency was able to obtain a classified report from a corporation by resorting to dumpster diving that unearthed a company phone book. With a few phone calls, the team was able to identify the concerned person authorized and also to request the report they wanted from the person whose job was to help users get reports. Company memo forms, also taken from the trash, were used to prepare a properly formatted request (with the help of the unwitting staffer). These were dropped into the company mail during a quick venture into the building by the infiltrator disguised as a courier. Finally, the crackers called the concerned department to let the staff know that the report would be picked up by a courier--who then walked out the door with the multi-thousand-page report. It's important to note that the crackers did not even have to physically access the company's computer systems. You can prevent this type of activity with some of the following countermeasures: • Require that all visitors are to be escorted at all times; • Instruct employees to report any repair people that show up without being called, and to not grant access to equipment until the workers' identities are established; • Keep wire closets, server rooms, phone closets, and other locations containing sensitive equipment locked at all times; • Keep an inventory of the equipment that is supposed to be in each server room, wire closet, and so on. Periodically check for extra or missing equipment.
  • 15. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 15 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Computer Based Social Engineering These can be divided into the following broad categories: Mail / IM attachments Pop-up Windows Websites / Sweepstakes Spam Mail At a large e-business enterprise, during an after hours Internet chat session, an employee was asked for a picture of himself. Although he didn't have one available, he obligingly asked for a photo from the other party. After a bit of additional encouragement, the other party agreed, sending an attachment that, in all respects, resembled a JPEG file. Upon accessing the attachment the hard drive started spinning, and of course, there was no photo. Fortunately, the employee was sophisticated enough to understand the danger of a Trojan horse being enclosed, and immediately alerted the IT department, who terminated the Internet connection. Later investigations revealed that the computer was infected with SubSeven, the most powerful backdoor at that time. Eventually, the company reinstalled the computer, rolled back to the day before with a backup tape (losing a full day of online orders), and stayed offline for three full days overall. Computer-based social engineering use software to retrieve information. Popup Windows – A window will appear on the screen telling the user that he has lost his network connection and needs to reenter their user name and password. A program previously installed by the intruder will then email the information back to a remote site. Mail Attachments – The use of a topical subject to trigger an emotion which leads to unwitting participation from the target. There are two common forms that may be used. The first involves malicious code, such as that used to create a virus. This code is usually hidden within a file attached to an email. The intention is that an unsuspecting user will click/open the file; for example, 'IloveYou' virus, 'Anna Kournikova' worm (It also is an example of how Social Engineers try to hide the file extension by giving the attachment a long file name. In this case, the attachment is named AnnaKournikova.jpg.vbs. If the name is truncated it will look like a jpg file
  • 16. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 16 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited and the user will not notice the .vbs extension) or more recently the 'Vote-A' email were worm. The second equally effective approach involves chain mail and Virus hoaxes. These have been designed to clog mail system by reporting a non existent virus or competition and requesting the recipient to forward a copy on to all their friends and co-workers. As history has shown, this can create a significant snowball effect once started. Websites – A ruse used to get an unwitting user to disclose potentially sensitive data, such as the password they use at work. For example, a website may promote a fictitious competition or promotion, which requires a user to enter in a contact email address and password. The password entered may very well be similar to the password used by the individual at work. A common trick is to offer something free or a chance to win a sweepstakes on a website. Many employees will enter the same password that they use at work, so the Social Engineer now has a valid user name and password to enter an organization’s network.
  • 17. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 17 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Reverse Social Engineering More advanced method of gaining illicit information is known as "reverse social engineering" This is when the hacker creates a persona that appears to be in a position of authority so that employees will ask him for information, rather than the other way around. The three parts of reverse social engineering attacks are sabotage, advertising and assisting. Generally, reverse social engineering is the most difficult to carry out. This is primarily because it takes a lot of preparation and skill to execute. The social engineer will assume the role of a person of authority, and have the employees asking him for information. The hacker usually manipulates the types of questions asked so he can draw out the information required. Preliminarily the social engineer will cause some incident creating a problem, then presents himself as the solver of the problem and through general conversation; he encourages employees to ask questions as well. As an example, an employee may ask about how this problem has affected particular files, or servers or equipment. This provides pertinent information to the social engineer. A lot of different skills and experiences are required to carry this tactic off well. Sabotage - After gaining simple access, the attacker either corrupts the workstation or gives it an appearance of being corrupted. The user of the system discovers the problem and tries to seek help Marketing - In order to ensure the user calls the attacker, the attacker must advertise. The attacker can do this by either leaving their business cards around the target's office and/or by placing their contact number on the error message itself Support - Finally, the attacker would assist with the problem, ensuring that the user remains unsuspicious while the attacker obtains the information they require. The "My Party" e-mail worm is an example of a "reverse social engineering" virus. Reverse social engineering viruses do not rely on sensational subject lines, such as AnnaKournikova or Naked Wife, to tempt users. Instead, reverse social engineering viruses use innocuous sounding subject lines and realistic attachment names.
  • 18. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 18 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Policies and Procedures Policy is the most critical component to any information security program. Good policies and procedures are not effective if they are not taught and reinforced to the employees. They need to be taught to emphasize their importance. After receiving training, the employee should sign a statement acknowledging that they understand the policies. No software or hardware security solutions can truly secure a corporate computing environment unless there is a sound security policy. These should be clearly articulated to the users such as acceptable use policy, Internet use policy and the like. The security policy sets the standards and level of security a corporate network will have. It also gives the network a security posture that can serve as a benchmark. This is even more critical when the security policy is formulated keeping in mind the threat the network faces from social engineering. The security policy can provide guidelines to users who are in a quandary when confronted by a cracker’s con. The policy can point directions to users on whether or not certain information can be given out. This should be well defined in advance by people who have seriously contemplated about the value of such information. Increasing employee confidence by laying out clear policies decreases the chance of the attacker wielding undue influence on an employee. The security policy must address a number of areas in order to be a foundation for social engineering resistance such as information access controls, setting up accounts, access approval and password changes. It should also deal with locks, ID’s, paper shredding, and escorting of visitors. The policy must have discipline built in and, above all, it must be enforced. The policies have a balancing effect in that the user besotted will not go out of his way and assume a different role when interacting with the cracker in person or on the phone. The policy also sets responsibility for information or access that is given out so that there is no question as to the employee’s own risk when giving away privileged information or access. The users must be able to recognize what kind of information a social engineer can use and what kinds of conversations should be considered suspicious. Users must be able to identify confidential information and understand their responsibility towards protecting the same. They also need to know when and how to refuse information from an inquirer with assurance of management backing.
  • 19. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 19 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Security Policies - Checklist Account Setup Password change policy Help desk procedures Access Privileges Violations Employee identification Privacy Policy Paper documents Modems Physical Access Restrictions Virus control • Account Setup: There should be an appropriate security policy that new employees can familiarize themselves with regarding their responsibility and use of the computing infrastructure. • Password change policy: The password policy should explicitly state that employees are required to use strong passwords and encouraged to change them frequently. They should be made aware of the security implication in case their password is stolen or copied by their mishandling of its storage. • Help Desk procedures: There must be a standard procedure for employee verification before the help desk is allowed to give out passwords. A caller id system on the phone is a good start so the help desk can identify where the call originates. The procedure could also require that the help desk call the employee back to verify his location. Another method would be to maintain an item of information that the employee would be required to know before the password was given out. Some organizations do not allow any passwords to be given out over the phone. The help desk must also know who to contact in case of security emergencies. • Access Privileges: There should be a specific procedure in place for how access is granted to various parts of the network. The procedure should state who is authorized to approve access and who can approve any exceptions. • Violations: There should be a procedure for employees to use to report any violations to policy. They should be encouraged to report any suspicious activity and assured that they will be supported for reporting violation.
  • 20. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 20 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited • Employee Identification: One way is to require employees to wear picture ID badges. Any guest should be required to register and wear a temporary ID badge while in the building. Employees should be encouraged to challenge anyone without a badge. • Privacy Policy. Company information should be protected. A policy should be in place stating that no one is to give out any more information than is necessary. A good policy would be to refer all surveys to a designated person. The policy should also contain procedures for escalating the request if someone is asking for more information than the employee is authorized to provide. • Paper Documents: All confidential documents should be shredded. • Modems. Modems attached to individual computers are a major security risk because they do not go through the firewall. Policy should not allow any modems attached to a network computer. • Physical Access Restriction: Sensitive areas should be physically protected with limited access. Doors should be locked and access only granted to employees with a business need. • Virus Control: Established procedures should be in place to take action and prevent the spread of any real viruses.
  • 21. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Social Engineering Module IX Page 21 of 21 Ethical Hacking and Countermeasures Copyright © by EC-Council All rights reserved. Reproduction is strictly prohibited EC-Council Summary Social Engineering is the human side of breaking into a corporate network. Social Engineering involves acquiring sensitive information or inappropriate access privileges by an outsider. Human-based Social Engineering refers to person to person interaction to retrieve the desired information. Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information A successful defense depends on having good policies in place and diligent implementation. Summary Recap • Social Engineering is the human side of breaking into a corporate network. • Social Engineering involves acquiring sensitive information or inappropriate access privileges by an outsider. • Human-based Social Engineering refers to person to person interaction to retrieve the desired information. • Computer based Social Engineering refers to having computer software that attempts to retrieve the desired information • A successful defense depends on having good policies in place and diligent implementation.