SlideShare a Scribd company logo
1 of 4
Download to read offline
DeepSec 2016 Talk: Social Engineering The Most Underestimated
APT – Hacking the Human Operating System – Dominique C. Brack
Posted on October 05,2016 by sanna
Social Engineering is an accepted Advanced Persistent Threat (APT) and is going to stay according to
Dominique C. Brack of the Reputelligence, Social Engineering Engagement Framework (SEEF). Most of the
high-value hacking attacks include components of social engineering. Understanding the behind the scene
methods and approaches of social engineering will help you make the world a safer place. Or make your attack
plans more successful! Social Engineering is a topic that does not really fit into technical hacking and is also
underestimated by security professionals. There are no tools or hardware you can buy to prevent Social
Engineering attacks.
But Social Engineering is an APT to be taken seriously, because most attacks consist partly of it and its attack
execution and prevention needs training and skills. Social Engineering has progressed and professionalized
more than you think. It is disastrously effective. Prior to his talk we asked Dominique C. Brack some questions
about the threats of SE.
Please tell us the top 5 facts about your talk.
My talk will provide the skills to detect, defend and assess Social Engineering attacks and describe the
associated risks that go along with it. You will learn about the motivations and methods used by social
engineers, to enable you to better protect yourself and your organization.
Especially you will learn about:
Assessing Social Engineering threats
Thinking like a social engineer
Considering attack frameworks (SEEF)
Reviewing the methods of manipulation
Identifying the countermeasures against Social Engineering
How did you come up with it? Was there something like an initial spark that set your
mind on creating this talk?
As a senior security professional I am working with many clients. International, local, governmental, defence
clients in highly sensitive settings (political or regulatory). For my clients I am always going the extra mile or
two. Some of them experienced highly sophisticated spear phishing attacks and attempts of industrial espionage.
In order to address these type of attacks I started to collect best practices and methods for dealing with Social
Engineering in its many facets, and eventually I wrote a book about it. I realized I couldn't address all my clients
at the same time and I also felt that the problem of Social Engineering is systemic and grossly underrated even
by security professionals. Out of this I decided, with my partner in Germany, to write the Social Engineering
Engagement Framework (SEEF) – FIRST CUT book, which is available as paperback and ebook. With this
book we want to raise awareness among all stakeholders who have to deal with it, for Social Engineering is one
of the most dangerous APTs. We will give away free ebooks to the participants of DeepSec 2016.
Why do you think this is an important topic?
Let me try to explain the importance of the threat of Social Engineering with an analogy. Think about this
asymmetry for a second:
Machines like personal computers, devices and mobile technology have their established defense mechanisms,
ranging from the standard mechanisms like user ID and Password to role based access and highly sophisticated
security technology like intrusion detection systems, malware detection, data leakage prevention, etc. Of course,
as we all know, these mechanisms are not perfect by far. At conferences like DeepSec we continually get
reminded of their failings and possibilities to circumvent those security mechanisms. But, people like you and
me have no sophisticated security technology whatsoever readily available to help to protect themselves from
being hacked.
If you think about this analogy, what do you think how important this topic is? For me this is the reason why I
believe Social Engineering is one the top subjects to work on. Of course working on the technical side to
improve your security posture is unquestionably important. But when it comes to Social Engineering there's a
vast security gap yawning all through the corporate world and its high time to deal with it.
Is there something you want everybody to know - Some good advice for our readers
maybe? Except for "Come to my talk."
Of course "Come to my talk". I mean not just "Come to my talk" - If you just come to my talk and treat it as a
filler then you better go out and have a coffee, talk to your partner, or write some e- mails. If you are not
convinced you will learn something, then have a piece of Sacher cake at the Hotel Sacher. It's delicious. But join
my talk if you want to learn, cause even as a pro you might learn something, in the worst case just about the
crowd joining social engineering talks ;-).
From my side I will give everything. I love information security and Social Engineering. Come and join me if:
You are a Social Engineering nerd and want to get insights on some of the latest concepts and
developments in Social Engineering.
You have to integrate SE into your risk framework.
You are seeking advice from Social Engineering consultants and you want a more robust risk framework
for scoping.
You are curious about Social Engineering.
You want to become a professional social engineer.
Don't join me if:
You are looking for one-to-one instructions.
You expect a totally finished and polished, politically correct speech. I am rough, it will be incomplete
and probably biased.
You are a superstar social engineer and resistant to learning or advice.
You are a know-it-all.
A prediction for the future - What do you think will be the next innovations or future
downfalls when it comes to particularly your field of expertise / the topic of your talk?
Unlike in the past, Social Engineering has become an engineering discipline with precise tools, selected
dynamic approaches and execution plans. This makes it also so damn hard to define counter-measures against
SE attacks on the receiving end. You really never know where you could get hit next.
Based on this my prediction for the future (I am already working on this) is the combination of the Internet of
Things (IoT) and Social Engineering.
I'm thinking of IoT and the whole advancements in technology. Wearables and insideables combined with
Social Engineering offer endless potential for very serious even life threatening scenarios.
In the hyper connected future, we already have seen a proof of concept for this type of attacks. I am referring to
the attacks based on the augmented reality app Pokémon GO. Pokémon GO is not only about searching for
Pokemon, it includes also PokeStops and is basically one big hunting game.
PokeStops are places of interest or other hotspots located in your actual community. They can be buildings,
monuments, public art, etc. You must walk about your town or city, find these PokeStops, and pick up the
special items they spit out in order to advance in the game.
As you can imagine the Game, respectively the hunt based on your mobile phone has already linked to injuries,
bad driving and opportunistic robberies. People don't watch where they go, the drive into other cars, overlook
traffic lights or fall down stairs.
And there have been reported cases where this so called PokeStops have been hacked and misused in order to
steal Pokemons or change rankings of players. With fake or hijacked PokeStops you can practically 'lure' your
victims into traps and direct them wherever you want them to go. It appears the safeguards of the players are
completely off when playing Pokémon GO.
This is a current example.
If you now extrapolate this to the world of IoT, where millions of actors, sensors and devices are
communicating over low security networks then you can imagine what could happen in the future.
For example:
Just imagine your insulin is low and your wearable will detect this. It will also inform you about the nearest
location of a pharmacy, hospital or doctor where you could get some insulin. As a diabetic, for a while you
might just endanger yourself a little and reset the respective alarm, but at some point you have to go and fetch it.
Just imagine that Insulin has become rare and expensive. The organ transplant mafia has gone cyber. They
create a business model for selling original medication to rich people. Hackers installed malware on IoT
endpoints and collect the communication of health wearables. Within minutes your location is determined and a
capture team will rob you of your insulin. Far fetched I know…
What will be connected to IoT?
Check on the baby
Remembering taking the medicine
Activity tracking
Smart home (heating, cooling, electricity, treating your water)
Intelligent traffic management systems
Waste management systems
Smart parking-space management
Internet-managed assembly lines
Snow Level Monitoring
Forest Fire Detection
Chemical leakage detection
Are this all topics where you don't mind low-level security?
dominique-c-brack
Image not found
http://blog.deepsec.net/wp-content/uploads/2016/10/Dominique-C.-BRACK.jpg
Dominique C.
Brack is a recognized expert in information security, including identity theft, social media exposure, data
breach, cyber security, human manipulation and online reputation management. He is a highly qualified, top-
performing professional with outstanding experience and achievements within key IT security, risk and project
management roles, confirming expertise in delivering innovative, customer-responsive projects and services in
highly sensitive environments on an international scale. Mr. Brack is accessible, real, professional, and
provides topical, timely and cutting edge information. Dominique’s direct and to-the-point tone of voice can be
counted on to capture attention, and – most importantly - inspire and empower action.Dominique C. Brack on
LinkedinDominique C. Brack on Xing.com Dominique C. Brack on Slideshare
Posted in:Conference,Security | Tagged:APT,DeepSec,IoT,PokemonGo,Social Engineering,Talk | With 2
comments

More Related Content

More from Reputelligence

DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2Reputelligence
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementReputelligence
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Reputelligence
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Reputelligence
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Reputelligence
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationReputelligence
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Reputelligence
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbReputelligence
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?Reputelligence
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)Reputelligence
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutReputelligence
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1Reputelligence
 
Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...Reputelligence
 
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public versionSgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public versionReputelligence
 

More from Reputelligence (20)

DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
The real- wolfpack story 2
The  real- wolfpack story 2The  real- wolfpack story 2
The real- wolfpack story 2
 
Quantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk managementQuantum Computing Shor algorithm crypto grafic IoT risk management
Quantum Computing Shor algorithm crypto grafic IoT risk management
 
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...Press release 01_september_2016_social_engineering_engagement_framework_seef_...
Press release 01_september_2016_social_engineering_engagement_framework_seef_...
 
Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...Business shoes looking inconspicuous but still enough power to climb a wall o...
Business shoes looking inconspicuous but still enough power to climb a wall o...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...Press release social engineering engagement framework seef social engineering...
Press release social engineering engagement framework seef social engineering...
 
Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef Video integrated teaser awareness campaign seef
Video integrated teaser awareness campaign seef
 
Teaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentationTeaser SEEF hack in Paris presentation
Teaser SEEF hack in Paris presentation
 
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016 Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
Sneak peek preview area 41 conference Zürich 10. - 11- June 2016
 
Seef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcbSeef ebook promotion 18 dez-2015 dcb
Seef ebook promotion 18 dez-2015 dcb
 
Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"Reputelligence lifecycle v3 Volkswagen "defeat device"
Reputelligence lifecycle v3 Volkswagen "defeat device"
 
Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example Reputelligence Lifecycle v3 Volkswagen example
Reputelligence Lifecycle v3 Volkswagen example
 
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
«Se Klaud Brojäkt bräiks daun – wot is se först sing yu du?» Hä?
 
Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3Reputelligence power point template lifecycle v3
Reputelligence power point template lifecycle v3
 
SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)SEEF Framework Intensity Levels (English)
SEEF Framework Intensity Levels (English)
 
Security agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rolloutSecurity agility- dynamic policy creation and rollout
Security agility- dynamic policy creation and rollout
 
Hack back series data is an asset - registration strategies v0.1
Hack back series  data is an asset - registration strategies v0.1Hack back series  data is an asset - registration strategies v0.1
Hack back series data is an asset - registration strategies v0.1
 
Hack back series how to spot fake linked in profiles - a way to figure out f...
Hack back series  how to spot fake linked in profiles - a way to figure out f...Hack back series  how to spot fake linked in profiles - a way to figure out f...
Hack back series how to spot fake linked in profiles - a way to figure out f...
 
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public versionSgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
Sgs cloud 5 mar-2015 bsl dominique c. brack csach - public version
 

Recently uploaded

20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...nilamkumrai
 

Recently uploaded (20)

📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 

Deep sec 2016_talk__social_engineering_the_most_underestimated_apt_____hacking_the_human_operating_system___dominique_c__brack

  • 1. DeepSec 2016 Talk: Social Engineering The Most Underestimated APT – Hacking the Human Operating System – Dominique C. Brack Posted on October 05,2016 by sanna Social Engineering is an accepted Advanced Persistent Threat (APT) and is going to stay according to Dominique C. Brack of the Reputelligence, Social Engineering Engagement Framework (SEEF). Most of the high-value hacking attacks include components of social engineering. Understanding the behind the scene methods and approaches of social engineering will help you make the world a safer place. Or make your attack plans more successful! Social Engineering is a topic that does not really fit into technical hacking and is also underestimated by security professionals. There are no tools or hardware you can buy to prevent Social Engineering attacks. But Social Engineering is an APT to be taken seriously, because most attacks consist partly of it and its attack execution and prevention needs training and skills. Social Engineering has progressed and professionalized more than you think. It is disastrously effective. Prior to his talk we asked Dominique C. Brack some questions about the threats of SE. Please tell us the top 5 facts about your talk. My talk will provide the skills to detect, defend and assess Social Engineering attacks and describe the associated risks that go along with it. You will learn about the motivations and methods used by social engineers, to enable you to better protect yourself and your organization. Especially you will learn about: Assessing Social Engineering threats Thinking like a social engineer Considering attack frameworks (SEEF) Reviewing the methods of manipulation Identifying the countermeasures against Social Engineering How did you come up with it? Was there something like an initial spark that set your mind on creating this talk? As a senior security professional I am working with many clients. International, local, governmental, defence clients in highly sensitive settings (political or regulatory). For my clients I am always going the extra mile or two. Some of them experienced highly sophisticated spear phishing attacks and attempts of industrial espionage. In order to address these type of attacks I started to collect best practices and methods for dealing with Social Engineering in its many facets, and eventually I wrote a book about it. I realized I couldn't address all my clients at the same time and I also felt that the problem of Social Engineering is systemic and grossly underrated even by security professionals. Out of this I decided, with my partner in Germany, to write the Social Engineering Engagement Framework (SEEF) – FIRST CUT book, which is available as paperback and ebook. With this book we want to raise awareness among all stakeholders who have to deal with it, for Social Engineering is one of the most dangerous APTs. We will give away free ebooks to the participants of DeepSec 2016.
  • 2. Why do you think this is an important topic? Let me try to explain the importance of the threat of Social Engineering with an analogy. Think about this asymmetry for a second: Machines like personal computers, devices and mobile technology have their established defense mechanisms, ranging from the standard mechanisms like user ID and Password to role based access and highly sophisticated security technology like intrusion detection systems, malware detection, data leakage prevention, etc. Of course, as we all know, these mechanisms are not perfect by far. At conferences like DeepSec we continually get reminded of their failings and possibilities to circumvent those security mechanisms. But, people like you and me have no sophisticated security technology whatsoever readily available to help to protect themselves from being hacked. If you think about this analogy, what do you think how important this topic is? For me this is the reason why I believe Social Engineering is one the top subjects to work on. Of course working on the technical side to improve your security posture is unquestionably important. But when it comes to Social Engineering there's a vast security gap yawning all through the corporate world and its high time to deal with it. Is there something you want everybody to know - Some good advice for our readers maybe? Except for "Come to my talk." Of course "Come to my talk". I mean not just "Come to my talk" - If you just come to my talk and treat it as a filler then you better go out and have a coffee, talk to your partner, or write some e- mails. If you are not convinced you will learn something, then have a piece of Sacher cake at the Hotel Sacher. It's delicious. But join my talk if you want to learn, cause even as a pro you might learn something, in the worst case just about the crowd joining social engineering talks ;-). From my side I will give everything. I love information security and Social Engineering. Come and join me if: You are a Social Engineering nerd and want to get insights on some of the latest concepts and developments in Social Engineering. You have to integrate SE into your risk framework. You are seeking advice from Social Engineering consultants and you want a more robust risk framework for scoping. You are curious about Social Engineering. You want to become a professional social engineer. Don't join me if: You are looking for one-to-one instructions. You expect a totally finished and polished, politically correct speech. I am rough, it will be incomplete and probably biased. You are a superstar social engineer and resistant to learning or advice. You are a know-it-all. A prediction for the future - What do you think will be the next innovations or future downfalls when it comes to particularly your field of expertise / the topic of your talk? Unlike in the past, Social Engineering has become an engineering discipline with precise tools, selected dynamic approaches and execution plans. This makes it also so damn hard to define counter-measures against
  • 3. SE attacks on the receiving end. You really never know where you could get hit next. Based on this my prediction for the future (I am already working on this) is the combination of the Internet of Things (IoT) and Social Engineering. I'm thinking of IoT and the whole advancements in technology. Wearables and insideables combined with Social Engineering offer endless potential for very serious even life threatening scenarios. In the hyper connected future, we already have seen a proof of concept for this type of attacks. I am referring to the attacks based on the augmented reality app Pokémon GO. Pokémon GO is not only about searching for Pokemon, it includes also PokeStops and is basically one big hunting game. PokeStops are places of interest or other hotspots located in your actual community. They can be buildings, monuments, public art, etc. You must walk about your town or city, find these PokeStops, and pick up the special items they spit out in order to advance in the game. As you can imagine the Game, respectively the hunt based on your mobile phone has already linked to injuries, bad driving and opportunistic robberies. People don't watch where they go, the drive into other cars, overlook traffic lights or fall down stairs. And there have been reported cases where this so called PokeStops have been hacked and misused in order to steal Pokemons or change rankings of players. With fake or hijacked PokeStops you can practically 'lure' your victims into traps and direct them wherever you want them to go. It appears the safeguards of the players are completely off when playing Pokémon GO. This is a current example. If you now extrapolate this to the world of IoT, where millions of actors, sensors and devices are communicating over low security networks then you can imagine what could happen in the future. For example: Just imagine your insulin is low and your wearable will detect this. It will also inform you about the nearest location of a pharmacy, hospital or doctor where you could get some insulin. As a diabetic, for a while you might just endanger yourself a little and reset the respective alarm, but at some point you have to go and fetch it. Just imagine that Insulin has become rare and expensive. The organ transplant mafia has gone cyber. They create a business model for selling original medication to rich people. Hackers installed malware on IoT endpoints and collect the communication of health wearables. Within minutes your location is determined and a capture team will rob you of your insulin. Far fetched I know… What will be connected to IoT? Check on the baby Remembering taking the medicine Activity tracking Smart home (heating, cooling, electricity, treating your water) Intelligent traffic management systems Waste management systems Smart parking-space management Internet-managed assembly lines Snow Level Monitoring Forest Fire Detection
  • 4. Chemical leakage detection Are this all topics where you don't mind low-level security? dominique-c-brack Image not found http://blog.deepsec.net/wp-content/uploads/2016/10/Dominique-C.-BRACK.jpg Dominique C. Brack is a recognized expert in information security, including identity theft, social media exposure, data breach, cyber security, human manipulation and online reputation management. He is a highly qualified, top- performing professional with outstanding experience and achievements within key IT security, risk and project management roles, confirming expertise in delivering innovative, customer-responsive projects and services in highly sensitive environments on an international scale. Mr. Brack is accessible, real, professional, and provides topical, timely and cutting edge information. Dominique’s direct and to-the-point tone of voice can be counted on to capture attention, and – most importantly - inspire and empower action.Dominique C. Brack on LinkedinDominique C. Brack on Xing.com Dominique C. Brack on Slideshare Posted in:Conference,Security | Tagged:APT,DeepSec,IoT,PokemonGo,Social Engineering,Talk | With 2 comments