SlideShare a Scribd company logo
Blue Team responses to people who “hack like a girl”
Kate Brew
@securitybrew
AlienVault
Co Founder C1ph3r_Qu33ns
Charisse Castagnoli
Websense
Co Founder C1ph3r_Qu33ns
Blue Team responses to people who “hack like a girl”
First: What Does “Hack Like A Girl” Mean?
Social Engineering (SE) is huge attack vector & very effective
SE doesn’t require detailed system knowledge or programming skills
Women are traditionally not viewed as a “threat” – IT more likely to be sympathetic & nice
Making women potentially quite effective at SE
Note: ” “Hack Like A Girl” is not an insult
What is Social Engineering
Social engineering is the art of manipulating people so they give up confidential information.
Criminals use social engineering tactics because it is usually easier to exploit your natural
inclination to trust than it is to discover ways to hack your software.
Source: Webroot.
Why does Social Engineering work?
Research has shown that most people respond to specific social queues:
Authority
You must to this because I am an authority over you
Boss to subordinate
Teacher to student
Commander to infantry
Obligation
You should help me because I did this for you
Remember when I finished your assignment for you
Responsibility
People trained/conditioned to assist
Customer service, Nursing, Cultural
Cultural Responsibility
Keiretsu, Cartels, Cultural norms
Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it
RED TEAM - US
• We present a scenario (many of these
are real world scenarios)
• Thanks to the SPICEHEADS who
contributed the scenarios!!
Gamification of Social Engineering Scenarios
BLUE TEAM - AUDIENCE
Respond with ways to defeat this
scenario
1 point for remediation
1 point for defense
extra point for identifying the social
pressure point
How we are going to play the game
We present an SE scenario
Audience responds with ways to defeat this SE
Best Answer gets a prize
At the end we award MVP Awards (2 $50 Amazon
Gift Cards)
Spearphishing
This is Ralph Simmons, your daughter’s school principal. You need to come pick your child up ASAP, as
there has been an incident with her and another student. To see a copy of the incident report we put on
file, Click Here!
Respectfully,
Mr. Simmons
Fake School Principal
Jack their Software (Jacking public information)
Contact a finance software vendor. Get a list of references from them. Contact people on that list
claiming to be part of a support team doing updates on the software via a remote connection.
If they grant you that connection, you have their finance system.
But I *really* need that app!
I know I’m not supposed to have it, but if I don’t get that app I’m going to
Miss a deadline
Be reprimanded
Get fired
I promise I’ll delete is as soon as this assignment is done
Have your kid stick a flash drive in target
Nobody suspects cute little kids. So you take your kid into a bank or other place with something to steal.
While you are conducting business, you have them stick the flash drive into the target.
Impersonating IT
This one works great if you are an evil insider with remotes sites where people don’t know you’re not
from IT. You badge in, then find a likely target. You go over to them and indicate that your network
security monitoring system has indicated their system has malware. You ask them to leave you logged
in and go get a coffee.
FedEx / Coffee / Water refill dude/dudette
Even without a badge, these delivery folks are allowed in without a second thought. They can bring in a
device to break into the corporate wireless network.
Poor Grandma!
Hello Mr./ Mrs. Suchandsuch.
This is {insert fake name here} calling from XYZ Advanced Care facility. Your mother/father has taken a
spill & needs to go to the hospital. We just need to confirm your insurance & billing info so that we can
facilitate his/her transport & treatment there.
Trickery to Steal Laptops
Look on internet for Oil and Gas company directory and get a persons name.
For example: http://www.kanataenergy.com/team.html 
Put on suit and show up at lunch and mumble to reception like you own the place, "I'm just heading
in to my meeting with Randy Hughes"...
Steal laptops from open offices,
Walk out.
This one requires programming, but sooo fun!
Emails claiming to be voicemail
Damn emails that claim to be a voicemail, even though the company has never never never ever,
gotten their voicemails via email and someone opened it.
“Helpful” Evil Co-workers
The human firewall is the most important part of a security equation, because attacks happen
anywhere. Even from that nice guy Bob who helped Mary in Accounting speed up her PC.
Scary Phishing
Your transaction for your MasterCard for the total of $3,576.43 has been approved. Please see
attachment for your receipt.
Attachment - invoice.pdf.exe
Just mean!
We had a semester long project where we were to secure a machine (linux) and try to hack another
team in the sandbox and couldn't physically touch their machine.
Group leaders received an email from the "teacher" saying over the semester break servers were
going to be switched out and she needed all the team’s passwords. Unfortunately my group leader
fell for it, and it was another team spoofing the instructors email.
Password Reuse
Create a web site offering something incredible (new social media site, free software, whatever.)
Require the user to submit a username and password for login. Use that information on larger sites
(Facebook, twitter, gmail, etc) and see if they use the same login credentials across all services, as
so many people do.
Microsoft Tech Support phone scam
You all know this one, but check out this response:
I had those guys call me. I have this POS 4G ethernet box I use when I travel, and a VM of
windows 10 running on one of the old junkers we restored and upgraded with spare parts, so I
decided to let them on. The VM was part of test lab, where we were testing lock down policies and
software compatibility.
They had a heck of a time, I was cracking up laughing. I eventually just said, "sorry, but I've been
effing with you, but I'm getting hungry so I'm going to go." Then he proceeded to call back, "sorry,
but we seemed to get disconnected, if you could go back to the lady page and start over..."
Thumb drive giveaway!
Post a couple of young women with scantly clad dresses at a conference, offering 4GB USB
thumbdrives (quite alot back then!). People were jacking up those USB thumbdrives in their enterprise
computers, without knowing that it had a crafted app that was sending every file they opened onto
outside; worse it also permitted remote access, so even the IT administrators computers were
compromised (the CTO laptop was one them).
The young women placed outside of the enterprise strategy worked because the majority of workers
were men and they didn't even notice the strangeness of strangers offering them thumbdrives for no
reason.
Demark closet
Hi I’m from the phone or cable company and need access to your demark closet.
receptionists usually let them in
What makes it totally believable is for that utility company worker to scowl and act like they would
rather be anywhere but your office.
And, if the receptionist calls the IT staff, tell them that you are HERE because another customer
over THERE has issues with their T-1 line, and they believe there may be cross-talk between one
of your T-1 lines an this other customer's lines. If you know that you now use fiber only, they can
still claim that this is a T-1 that was supposed to be de-commissioned but they failed to do it
properly, and that is why you have had ongoing problems on your phone bill...
Anti-Virus – Over-trusting
I used to work for a well-known anti-virus company. I did the business technical support for all
customers around the globe.
To remove viruses we had to remotely log into the computers at the company. The I.T people would
quite often log you in and then tell you they were going on lunch, or going home and ask you to
shut down when you are finished.
Never thought about it at the time but it was basically a wide open door to the company’s data. It’s
not like we were just logged on, we were logged on with the IT persons credentials and authorised
to auto log on after reboot!!!
Spear-phishing Execs
During pen test at trading company, client was tighter Kim Kardashian's latex Catwoman outfit.
Hammering the routers, DNS, firewalls, and all other tech yields nothing of value.
The social engineering group (SEG) digs in. They easily find the name of the CFO. They find her
facebook, LinkedIn, and twitter pages. The see what her likes and dislikes are, and more
importantly, the causes she supports. They dig more and come up with a list containing a
substantial number of the employees
They craft a web site. They craft a nice email in the CFO's name asking for them, if they want, to
click on this link to donate money to one of her pet causes. They send it to all the employees. Two
of them click the link, one a low-level employee and the other one of the people who deals with
trades.
The link silently installs a keylogger. All data - password, accounts, etc.- from the trader is now
compromised.
Fake IM from Co-Worker
Send an IM from an account that looks like a coworker’s saying "This link does not work for me.
Could you try it before I call and bother IT?" malicious link here
The Server Room
Bring a Pepsi into the server room. Spill it all over. Or, take a huge magnet in your purse and lean
on some of the servers.
PopUps complaining of malware
Popups that tell the user their computer is infected and needs to be fixed... simply download this
software to fix it.
Well, looks like that didn't quite work.... and it is a much bigger problem then we originally
thought.... but if you pay us it will work! So pay us now and it will all be fixed!
So many relatives that have fallen for this one... and a few friends. *Le Sigh*
Wirefraud Phishing
From:
Date: February 26, 2015 at 11:07:36 AM CST
To:
Subject: Cancelled Wire Money Transfer. Dispute Number 932453
The Wire transfer (ID: J217485011), recently
sent from your online bank account, was aborted by the Electronic Payments
Association.
Canceled transfer
Transfer Case ID 113548
Total Amount 3798.61 USD
Sender contact name@domain.com
Reason for rejection See attached file
The Email contained several links to the virus VBA/TrojanDownloader.Agent.IY trojan, not only in the
attachment, but linked in the sender's address.
Obamacare Phishing
The best social engineering is one that uses the government and people's inherent greed and
ignorance of the law. This is what makes financial scams so effective. Use snail mail and a fake PO
Box.
"I'm from the IRS. You didn't claim your $5,000 Obamacare bonus refund. Since you didn't use all
of your free healthcare money for 2014, you have a choice of rolling it over or having it added to
your tax refund. If you don't reply in two weeks, this claim will expire."
Then generate a fake tax form and have them fill out what ever information you need from them.
90% of people will want a check. Have them submit the form using a faked website.
Using Obamacare in the scam is good because people don't know squat about the law. There was
a recent report on the enrollment date being pushed back because people didn't know about the
fine. So ignorance is high on this complicated law.
D’Oh LinkedIn
Go to LinkedIn and connect with someone. Offer them a fake, high paying job. Require they fill out
a form before on-site interview. Collect all info, including SSN.
Citrix
For a company using Citrix with a web portal at:
https://www.somecompany.com/Citrix/Metaframe/default.aspx
You register dynamic dns domain like com.ntdll.net. Add a host www.somecompany to that domain and clone their citrix web
portal. Have your fake site save the credentials and pass them on to the real citrix portal so they can actually log in. So the
phishing site you set up is:
https://www.somecompany.com.ntdll.net/Citrix/Metaframe/default.aspx
Then craft an email with a link showing the real domain but actually going to your phishing page:
Hello,
As many of you have probably noticed there have been some performance issues with using citrix remotely. We've been working
hard to resolve the issue and are pleased to say we've finally upgraded our Citrix servers. Everything should be running much
smoother now. The new Citrix portal just needs you to log in to help migrate your profile over to the new server. Please log in within
the next 24 hours so we can get everyone migrated over and running on the new system. For your convenience I've included the
link below.
https://www.somecompany.com/Citrix/Metaframe/default.aspx
Thanks,
IT Department
Some Company
Chances are if they do click your link and see the url they won't be too suspicious because at first glance it looks very much like the
real link.
Common Denominator: “Expect the Unexpected”

More Related Content

What's hot

The holo
The holoThe holo
The holo
Joel Brooks
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security students
Joel Cardella
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
Greg Bold
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
Imperva
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Esteban Bedoya
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
Rozell Sneede
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
ConnectYourCommunity
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
James Tanner
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 

What's hot (14)

The holo
The holoThe holo
The holo
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security students
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 

Viewers also liked

Food 4 Social Change - why now?
Food 4 Social Change - why now?Food 4 Social Change - why now?
Food 4 Social Change - why now?
Mari-Lyn Harris
 
Power 2010
Power 2010Power 2010
Power 2010
Ahmed Younes
 
The Story About The Tiny Frogs
The Story About The Tiny FrogsThe Story About The Tiny Frogs
The Story About The Tiny Frogs
Shruti Bhatia
 
Poetry and figurative language
Poetry and figurative languagePoetry and figurative language
Poetry and figurative language
mmcminn
 
The story of cake
The story of cakeThe story of cake
The story of cake
Ahmed Younes
 
The story of cake
The story of cakeThe story of cake
The story of cake
Ahmed Younes
 
Langston Hughes
Langston HughesLangston Hughes
Langston Hughes
coolmum4u
 
Greetings, Messages, Wishes
Greetings, Messages, WishesGreetings, Messages, Wishes
Greetings, Messages, Wishes
OH TEIK BIN
 
4.friend by hone_tuwhare
4.friend by hone_tuwhare4.friend by hone_tuwhare
4.friend by hone_tuwhare
Charter College
 
Form 4 English Language Scheme of Work 2015
Form 4 English Language Scheme of Work 2015Form 4 English Language Scheme of Work 2015
Form 4 English Language Scheme of Work 2015
Umagowrie Supramaniam
 
Beowulf Intro Pp 1
Beowulf Intro Pp 1Beowulf Intro Pp 1
Beowulf Intro Pp 1
Marilou Petlowany
 
If by Rudyard Kipling Analysis
If by Rudyard Kipling AnalysisIf by Rudyard Kipling Analysis
If by Rudyard Kipling Analysis
MaryGeneville Abit
 
Designing a commercial kitchen
Designing a commercial kitchenDesigning a commercial kitchen
Designing a commercial kitchen
Patrick Colley
 
Lesson Plan in English 2 (REALITY/FANTASY)
Lesson Plan in English 2 (REALITY/FANTASY)Lesson Plan in English 2 (REALITY/FANTASY)
Lesson Plan in English 2 (REALITY/FANTASY)
Sharyn Gayo
 
Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)
Dian Fadhilawati
 

Viewers also liked (15)

Food 4 Social Change - why now?
Food 4 Social Change - why now?Food 4 Social Change - why now?
Food 4 Social Change - why now?
 
Power 2010
Power 2010Power 2010
Power 2010
 
The Story About The Tiny Frogs
The Story About The Tiny FrogsThe Story About The Tiny Frogs
The Story About The Tiny Frogs
 
Poetry and figurative language
Poetry and figurative languagePoetry and figurative language
Poetry and figurative language
 
The story of cake
The story of cakeThe story of cake
The story of cake
 
The story of cake
The story of cakeThe story of cake
The story of cake
 
Langston Hughes
Langston HughesLangston Hughes
Langston Hughes
 
Greetings, Messages, Wishes
Greetings, Messages, WishesGreetings, Messages, Wishes
Greetings, Messages, Wishes
 
4.friend by hone_tuwhare
4.friend by hone_tuwhare4.friend by hone_tuwhare
4.friend by hone_tuwhare
 
Form 4 English Language Scheme of Work 2015
Form 4 English Language Scheme of Work 2015Form 4 English Language Scheme of Work 2015
Form 4 English Language Scheme of Work 2015
 
Beowulf Intro Pp 1
Beowulf Intro Pp 1Beowulf Intro Pp 1
Beowulf Intro Pp 1
 
If by Rudyard Kipling Analysis
If by Rudyard Kipling AnalysisIf by Rudyard Kipling Analysis
If by Rudyard Kipling Analysis
 
Designing a commercial kitchen
Designing a commercial kitchenDesigning a commercial kitchen
Designing a commercial kitchen
 
Lesson Plan in English 2 (REALITY/FANTASY)
Lesson Plan in English 2 (REALITY/FANTASY)Lesson Plan in English 2 (REALITY/FANTASY)
Lesson Plan in English 2 (REALITY/FANTASY)
 
Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)Introduction to Literature (Poetry, Drama, Prose)
Introduction to Literature (Poetry, Drama, Prose)
 

Similar to Blue team responses to people who "hack like a girl"

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Ferret - Data Seepage
Ferret - Data SeepageFerret - Data Seepage
Ferret - Data Seepage
amiable_indian
 
UUUU
UUUUUUUU
UUUU
yonny4103
 
Ferret
FerretFerret
Ferret
yonny4103
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
Wiliam Ferraciolli
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
The TNS Group
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Human Resources & Payroll
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
hubbargf
 
Essay Ict Is The Cause Of TodayS Many Social Ills
Essay Ict Is The Cause Of TodayS Many Social IllsEssay Ict Is The Cause Of TodayS Many Social Ills
Essay Ict Is The Cause Of TodayS Many Social Ills
Lilian Gerlin
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
morticelocksnational21
 
The Seven Social Engineering Vices
The Seven Social Engineering VicesThe Seven Social Engineering Vices
The Seven Social Engineering Vices
Stu Sjouwerman
 
Online Safety
Online Safety Online Safety
Online Safety
Janetta Garton
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
Bruce Wolfe
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
Stu Sjouwerman
 
Practical exploitation and social engineering
Practical exploitation and social engineeringPractical exploitation and social engineering
Practical exploitation and social engineering
Tiago Henriques
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Ron Pierce
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
Vic Hemard
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
Christian Heilmann
 

Similar to Blue team responses to people who "hack like a girl" (20)

National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Ferret - Data Seepage
Ferret - Data SeepageFerret - Data Seepage
Ferret - Data Seepage
 
UUUU
UUUUUUUU
UUUU
 
Ferret
FerretFerret
Ferret
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Essay Ict Is The Cause Of TodayS Many Social Ills
Essay Ict Is The Cause Of TodayS Many Social IllsEssay Ict Is The Cause Of TodayS Many Social Ills
Essay Ict Is The Cause Of TodayS Many Social Ills
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Prevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access ControlPrevent Strikes On Industrial And Civil Items Using Access Control
Prevent Strikes On Industrial And Civil Items Using Access Control
 
The Seven Social Engineering Vices
The Seven Social Engineering VicesThe Seven Social Engineering Vices
The Seven Social Engineering Vices
 
Online Safety
Online Safety Online Safety
Online Safety
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 
Practical exploitation and social engineering
Practical exploitation and social engineeringPractical exploitation and social engineering
Practical exploitation and social engineering
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Blue team responses to people who "hack like a girl"

  • 1. Blue Team responses to people who “hack like a girl” Kate Brew @securitybrew AlienVault Co Founder C1ph3r_Qu33ns Charisse Castagnoli Websense Co Founder C1ph3r_Qu33ns
  • 2. Blue Team responses to people who “hack like a girl” First: What Does “Hack Like A Girl” Mean? Social Engineering (SE) is huge attack vector & very effective SE doesn’t require detailed system knowledge or programming skills Women are traditionally not viewed as a “threat” – IT more likely to be sympathetic & nice Making women potentially quite effective at SE Note: ” “Hack Like A Girl” is not an insult
  • 3. What is Social Engineering Social engineering is the art of manipulating people so they give up confidential information. Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. Source: Webroot.
  • 4. Why does Social Engineering work? Research has shown that most people respond to specific social queues: Authority You must to this because I am an authority over you Boss to subordinate Teacher to student Commander to infantry Obligation You should help me because I did this for you Remember when I finished your assignment for you Responsibility People trained/conditioned to assist Customer service, Nursing, Cultural Cultural Responsibility Keiretsu, Cartels, Cultural norms Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it
  • 5. RED TEAM - US • We present a scenario (many of these are real world scenarios) • Thanks to the SPICEHEADS who contributed the scenarios!! Gamification of Social Engineering Scenarios BLUE TEAM - AUDIENCE Respond with ways to defeat this scenario 1 point for remediation 1 point for defense extra point for identifying the social pressure point
  • 6. How we are going to play the game We present an SE scenario Audience responds with ways to defeat this SE Best Answer gets a prize At the end we award MVP Awards (2 $50 Amazon Gift Cards)
  • 7. Spearphishing This is Ralph Simmons, your daughter’s school principal. You need to come pick your child up ASAP, as there has been an incident with her and another student. To see a copy of the incident report we put on file, Click Here! Respectfully, Mr. Simmons Fake School Principal
  • 8. Jack their Software (Jacking public information) Contact a finance software vendor. Get a list of references from them. Contact people on that list claiming to be part of a support team doing updates on the software via a remote connection. If they grant you that connection, you have their finance system.
  • 9. But I *really* need that app! I know I’m not supposed to have it, but if I don’t get that app I’m going to Miss a deadline Be reprimanded Get fired I promise I’ll delete is as soon as this assignment is done
  • 10. Have your kid stick a flash drive in target Nobody suspects cute little kids. So you take your kid into a bank or other place with something to steal. While you are conducting business, you have them stick the flash drive into the target.
  • 11. Impersonating IT This one works great if you are an evil insider with remotes sites where people don’t know you’re not from IT. You badge in, then find a likely target. You go over to them and indicate that your network security monitoring system has indicated their system has malware. You ask them to leave you logged in and go get a coffee.
  • 12. FedEx / Coffee / Water refill dude/dudette Even without a badge, these delivery folks are allowed in without a second thought. They can bring in a device to break into the corporate wireless network.
  • 13. Poor Grandma! Hello Mr./ Mrs. Suchandsuch. This is {insert fake name here} calling from XYZ Advanced Care facility. Your mother/father has taken a spill & needs to go to the hospital. We just need to confirm your insurance & billing info so that we can facilitate his/her transport & treatment there.
  • 14. Trickery to Steal Laptops Look on internet for Oil and Gas company directory and get a persons name. For example: http://www.kanataenergy.com/team.html  Put on suit and show up at lunch and mumble to reception like you own the place, "I'm just heading in to my meeting with Randy Hughes"... Steal laptops from open offices, Walk out.
  • 15. This one requires programming, but sooo fun!
  • 16. Emails claiming to be voicemail Damn emails that claim to be a voicemail, even though the company has never never never ever, gotten their voicemails via email and someone opened it.
  • 17. “Helpful” Evil Co-workers The human firewall is the most important part of a security equation, because attacks happen anywhere. Even from that nice guy Bob who helped Mary in Accounting speed up her PC.
  • 18. Scary Phishing Your transaction for your MasterCard for the total of $3,576.43 has been approved. Please see attachment for your receipt. Attachment - invoice.pdf.exe
  • 19. Just mean! We had a semester long project where we were to secure a machine (linux) and try to hack another team in the sandbox and couldn't physically touch their machine. Group leaders received an email from the "teacher" saying over the semester break servers were going to be switched out and she needed all the team’s passwords. Unfortunately my group leader fell for it, and it was another team spoofing the instructors email.
  • 20. Password Reuse Create a web site offering something incredible (new social media site, free software, whatever.) Require the user to submit a username and password for login. Use that information on larger sites (Facebook, twitter, gmail, etc) and see if they use the same login credentials across all services, as so many people do.
  • 21. Microsoft Tech Support phone scam You all know this one, but check out this response: I had those guys call me. I have this POS 4G ethernet box I use when I travel, and a VM of windows 10 running on one of the old junkers we restored and upgraded with spare parts, so I decided to let them on. The VM was part of test lab, where we were testing lock down policies and software compatibility. They had a heck of a time, I was cracking up laughing. I eventually just said, "sorry, but I've been effing with you, but I'm getting hungry so I'm going to go." Then he proceeded to call back, "sorry, but we seemed to get disconnected, if you could go back to the lady page and start over..."
  • 22. Thumb drive giveaway! Post a couple of young women with scantly clad dresses at a conference, offering 4GB USB thumbdrives (quite alot back then!). People were jacking up those USB thumbdrives in their enterprise computers, without knowing that it had a crafted app that was sending every file they opened onto outside; worse it also permitted remote access, so even the IT administrators computers were compromised (the CTO laptop was one them). The young women placed outside of the enterprise strategy worked because the majority of workers were men and they didn't even notice the strangeness of strangers offering them thumbdrives for no reason.
  • 23. Demark closet Hi I’m from the phone or cable company and need access to your demark closet. receptionists usually let them in What makes it totally believable is for that utility company worker to scowl and act like they would rather be anywhere but your office. And, if the receptionist calls the IT staff, tell them that you are HERE because another customer over THERE has issues with their T-1 line, and they believe there may be cross-talk between one of your T-1 lines an this other customer's lines. If you know that you now use fiber only, they can still claim that this is a T-1 that was supposed to be de-commissioned but they failed to do it properly, and that is why you have had ongoing problems on your phone bill...
  • 24. Anti-Virus – Over-trusting I used to work for a well-known anti-virus company. I did the business technical support for all customers around the globe. To remove viruses we had to remotely log into the computers at the company. The I.T people would quite often log you in and then tell you they were going on lunch, or going home and ask you to shut down when you are finished. Never thought about it at the time but it was basically a wide open door to the company’s data. It’s not like we were just logged on, we were logged on with the IT persons credentials and authorised to auto log on after reboot!!!
  • 25. Spear-phishing Execs During pen test at trading company, client was tighter Kim Kardashian's latex Catwoman outfit. Hammering the routers, DNS, firewalls, and all other tech yields nothing of value. The social engineering group (SEG) digs in. They easily find the name of the CFO. They find her facebook, LinkedIn, and twitter pages. The see what her likes and dislikes are, and more importantly, the causes she supports. They dig more and come up with a list containing a substantial number of the employees They craft a web site. They craft a nice email in the CFO's name asking for them, if they want, to click on this link to donate money to one of her pet causes. They send it to all the employees. Two of them click the link, one a low-level employee and the other one of the people who deals with trades. The link silently installs a keylogger. All data - password, accounts, etc.- from the trader is now compromised.
  • 26. Fake IM from Co-Worker Send an IM from an account that looks like a coworker’s saying "This link does not work for me. Could you try it before I call and bother IT?" malicious link here
  • 27. The Server Room Bring a Pepsi into the server room. Spill it all over. Or, take a huge magnet in your purse and lean on some of the servers.
  • 28. PopUps complaining of malware Popups that tell the user their computer is infected and needs to be fixed... simply download this software to fix it. Well, looks like that didn't quite work.... and it is a much bigger problem then we originally thought.... but if you pay us it will work! So pay us now and it will all be fixed! So many relatives that have fallen for this one... and a few friends. *Le Sigh*
  • 29. Wirefraud Phishing From: Date: February 26, 2015 at 11:07:36 AM CST To: Subject: Cancelled Wire Money Transfer. Dispute Number 932453 The Wire transfer (ID: J217485011), recently sent from your online bank account, was aborted by the Electronic Payments Association. Canceled transfer Transfer Case ID 113548 Total Amount 3798.61 USD Sender contact name@domain.com Reason for rejection See attached file The Email contained several links to the virus VBA/TrojanDownloader.Agent.IY trojan, not only in the attachment, but linked in the sender's address.
  • 30. Obamacare Phishing The best social engineering is one that uses the government and people's inherent greed and ignorance of the law. This is what makes financial scams so effective. Use snail mail and a fake PO Box. "I'm from the IRS. You didn't claim your $5,000 Obamacare bonus refund. Since you didn't use all of your free healthcare money for 2014, you have a choice of rolling it over or having it added to your tax refund. If you don't reply in two weeks, this claim will expire." Then generate a fake tax form and have them fill out what ever information you need from them. 90% of people will want a check. Have them submit the form using a faked website. Using Obamacare in the scam is good because people don't know squat about the law. There was a recent report on the enrollment date being pushed back because people didn't know about the fine. So ignorance is high on this complicated law.
  • 31. D’Oh LinkedIn Go to LinkedIn and connect with someone. Offer them a fake, high paying job. Require they fill out a form before on-site interview. Collect all info, including SSN.
  • 32. Citrix For a company using Citrix with a web portal at: https://www.somecompany.com/Citrix/Metaframe/default.aspx You register dynamic dns domain like com.ntdll.net. Add a host www.somecompany to that domain and clone their citrix web portal. Have your fake site save the credentials and pass them on to the real citrix portal so they can actually log in. So the phishing site you set up is: https://www.somecompany.com.ntdll.net/Citrix/Metaframe/default.aspx Then craft an email with a link showing the real domain but actually going to your phishing page: Hello, As many of you have probably noticed there have been some performance issues with using citrix remotely. We've been working hard to resolve the issue and are pleased to say we've finally upgraded our Citrix servers. Everything should be running much smoother now. The new Citrix portal just needs you to log in to help migrate your profile over to the new server. Please log in within the next 24 hours so we can get everyone migrated over and running on the new system. For your convenience I've included the link below. https://www.somecompany.com/Citrix/Metaframe/default.aspx Thanks, IT Department Some Company Chances are if they do click your link and see the url they won't be too suspicious because at first glance it looks very much like the real link.
  • 33. Common Denominator: “Expect the Unexpected”

Editor's Notes

  1. FBI research communicated at SEI insider threat symposium 2014