SlideShare a Scribd company logo
1 of 27
Hacker tool talk: SET
The Social Engineering Toolkit
   “Or how I learned to put tape over my webcam”

                 Chris Hammond-Thrasher
        chris.hammond-thrasher <at> ca.fujitsu.com
               Fujitsu Edmonton Security Lab
                       December 2011




                   Fujitsu Edmonton Security Lab     1
Agenda
•   Why are we here?
•   What is social engineering?
•   Setting up a security lab
•   About SET and its dependencies
•   Installing SET
•   SET demo
•   What’s next?

                 Fujitsu Edmonton Security Lab   2
Why are we here?




    Fujitsu Edmonton Security Lab   3
Ethics and motives
“Every single scam in human history has
worked for one key reason; the victim did
not recognize it as a scam.”
- R. Paul Wilson




                Fujitsu Edmonton Security Lab   4
What is social engineering?




         Fujitsu Edmonton Security Lab   5
Social science definition
• “Social engineering is a discipline in political science that
  refers to efforts to influence popular attitudes and social
  behaviors on a large scale, whether by governments or
  private groups… For various reasons, the term has been
  imbued with negative connotations. However, virtually all law
  and governance has the effect of changing behavior and can
  be considered "social engineering" to some extent.
  Prohibitions on murder, rape, suicide and littering are all
  policies aimed at discouraging undesirable behaviors. In
  British and Canadian jurisprudence, changing public attitudes
  about a behaviour is accepted as one of the key functions of
  laws prohibiting it. Governments also influence behavior more
  subtly through incentives and disincentives built into economic
  policy and tax policy, for instance, and have done so for
  centuries.”
  - Wikipedia (“social engineering (political science)” 26 October 2011)


                                Fujitsu Edmonton Security Lab              6
Information security definition
• “We define it as the act of manipulating a
  person to accomplish goals that may or
  may not be in the “target’s” best interest.
  This may include obtaining information,
  gaining access, or getting the target to
  take certain action.”
 - Chris Hadnagy (social-engineer.org)




                        Fujitsu Edmonton Security Lab   7
Setting up a security lab




        Fujitsu Edmonton Security Lab   8
Security lab reqs
• It’s actually pretty easy to setup
   – A network
      • Isolated from other networks
      • Any wired hub, switch, or router and cable; wireless is an option;
        or the virtual network created by virtualization tools is also OK.
      • Recommendation: Keep it simple and go wired if you can
   – Attack/dev box
      • Linux or Unix is generally the best option, OS X is getting better
        support, or Windows as the least desirable OS.
      • Recommendation: OS: Backtrack Linux, Packet tool: Wireshark
   – Target box
      • Recommendation: OS: Windows (any) and VMWare (or your
        favorite virtualization tool)
   – Logging/monitoring box (Optional)
      • Recommendation: OS: Any, Packet tool: Wireshark

                          Fujitsu Edmonton Security Lab                      9
Caution
• This is not a game. Attacking machines
  with the tools in this presentation without
  permission is not only unethical, but is a
  criminal offense in many jurisdictions.




                 Fujitsu Edmonton Security Lab   10
About SET




 Fujitsu Edmonton Security Lab   11
History
• The Social Engineering Toolkit (SET)
  – An open source project lead by Dave Kennedy, Chief
    Information Security Officer of a Fortune 1000
    company
  – Leverages the Metasploit Framework, FastTrack
    (another Dave Kennedy lead project), and other open
    source tools
  – Originally released in 2009 to coincide with the launch
    of social-engineer.org
  – “The Social-Engineering Toolkit (SET) is a python-
    driven suite of custom tools which solely focuses on
    attacking the human element of pentesting. It’s main
    purpose is to augment and simulate social-
    engineering attacks and allow the tester to effectively
    test how a targeted attack may succeed.”
    - from the secmaniac.org download page
                     Fujitsu Edmonton Security Lab       12
Features
• SET implements a variety of targeted
  attacks that fall into three main categories
  1. Create malicious websites through site
     cloning or templates that launch Metasploit
     or Java applet attacks at clients
  2. Create and send phishing and
     spearphishing emails
  3. Create malicious files – PDFs, MS Office
     docs, EXEs, etc.
• Free as in speech and beer
                  Fujitsu Edmonton Security Lab    13
Legit uses of SET
• Penetration testing – with or without social
  engineering in scope
  – “Can an attacker still get shell when my firewall, IDS,
    and antivirus are awesome?”
  – “Can an attacker get shell on privately addressed
    machines behind my NATed firewall?”
  – “How can I check if my staff can be fooled into doing
    something stupid and placing the entire enterprise
    and our clients at risk?”



                     Fujitsu Edmonton Security Lab            14
h4X0r$
• Provide the technical components of social
  engineering attacks
  – “I think I can trick the CEO/CFO/Financial
    Analyst/DBA into clicking on a link or opening a file
    attachment that I email to her, but how do I create an
    evil site or file for her to hit?”
  – “If I am going to drop USB thumb drives in the target’s
    parking lot, what evil file should I put on it?”
  – “How can I encode my evil payload to evade
    antivirus?”

                     Fujitsu Edmonton Security Lab        15
Installing SET




  Fujitsu Edmonton Security Lab   16
Choices
• Easiest: Get latest Backtrack (BT5R1)
 http://www.backtrack-linux.org/downloads/

• Linux power user: Use svn to install the
  latest build (no compile required – it’s
  Python)
 svn co http://svn.secmaniac.com/social_engineering_toolkit set/

 and

 firefox http://metasploit.com/download/ &

 (grab the latest stable Metasploit release and follow installation instructions)
                            Fujitsu Edmonton Security Lab                      17
Configuration
• Regardless of your installation method,
  open and edit the set_config file in the
  config directory of your SET installation (in
  Backtrack this is
  pentest/exploits/SET/config/set_config)
• The configuration file is well commented –
  don’t be afraid


                 Fujitsu Edmonton Security Lab   18
SET demo




Fujitsu Edmonton Security Lab   19
SET demo
•   Starting it up
•   Updating SET and Metasploit
•   Menu tour
•   The Java applet attack vector
•   A quick look at post exploitation (or why I
    have tape over my webcam lens)



                   Fujitsu Edmonton Security Lab   20
1. HTTP GET request on port 80 (initiated by the user)



                          2. HTTP RESPONSES with HTML and Java payload

                                                                                                     3. Anti-
Attacker’s Web Server




                                                                                                     virus?




                                                                                                                 Victim’s Browser
                                                                                 Victim’s Firewall
                                                                                                     4. Run
                                                                                                     unsigned
                                                                                                       Java
                               4. Request TCP connection on port 443                                 applet?



                             5. Command and control session established



                                                 Fujitsu Edmonton Security Lab                                  21
What’s next




 Fujitsu Edmonton Security Lab   22
Learn more
• Read social-engineer.org and listen to
  their podcast
• Read Chris Hadnagy’s Social Engineering:
  The Art of Human Hacking




               Fujitsu Edmonton Security Lab   23
Act locally
• At work
  – Show your colleagues how clicking on an
    innocent URL and then ignoring the Java
    applet warning can lead to their laptop turning
    into a spy-cam
  – Show your colleagues how scam emails can
    lead to your computer being compromised if
    you open attachments or follow links – even if
    you don’t reply to their pleas for financial help

                   Fujitsu Edmonton Security Lab    24
Act locally
• At home
  – My family used to ignore my warnings about
    strange email attachments and URLs. Then
    one day I fired up the SET Java applet attack
    and emailed my daughter a URL with a
    message to check out “something cool”. Two
    minutes later I called her over to my machine
    and showed her a picture of herself that I had
    captured through her laptop’s webcam. Not
    only will she never follow a strange link again
    but she has covered her webcam lens with
    masking tape.
                  Fujitsu Edmonton Security Lab   25
Thank you!


                  Want more presentations like this?
Is there a particular tool or hack that you would like to see demoed?

              Fujitsu Edmonton Security Lab
                Chris Hammond-Thrasher
  Email: chris.hammond-thrasher <at> ca.fujitsu.com
                   Twitter: @thrashor

                        Yetunde Oladunni
               Email: yetundefashoro@gmail.com

                         Fujitsu Edmonton Security Lab                  26
Fujitsu Edmonton Security Lab   27

More Related Content

What's hot

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 

What's hot (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
OSINT
OSINTOSINT
OSINT
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 

Viewers also liked

Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyMike Murray
 
Introduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceIntroduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceTOP Technology Talks (TOP b.v.)
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
Social engineering-Sandy Suhling
Social engineering-Sandy SuhlingSocial engineering-Sandy Suhling
Social engineering-Sandy Suhlingsuhlingse
 
Antisocial powerpoint
Antisocial powerpointAntisocial powerpoint
Antisocial powerpointMilen Ramos
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 

Viewers also liked (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Introduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceIntroduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produce
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
Netcat
NetcatNetcat
Netcat
 
Social engineering-Sandy Suhling
Social engineering-Sandy SuhlingSocial engineering-Sandy Suhling
Social engineering-Sandy Suhling
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Antisocial powerpoint
Antisocial powerpointAntisocial powerpoint
Antisocial powerpoint
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 

Similar to Hacker tooltalk: Social Engineering Toolkit (SET)

Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GSavvius, Inc
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss developmentbezpiecznik
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudInternap
 
Scalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureScalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureNicholas Zakas
 
32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canadaTech Online
 
33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canadaTech Online
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...Itris Automation Square
 
Web 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business ModelsWeb 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business Modelscghollins
 
31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canadaTech Online
 
Satellite With Alt Dvb
Satellite With Alt DvbSatellite With Alt Dvb
Satellite With Alt DvbSais Abdelkrim
 
Mobile Cloud Architectures
Mobile Cloud ArchitecturesMobile Cloud Architectures
Mobile Cloud ArchitecturesDavid Coallier
 
A Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesA Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesChris McNulty
 
Vc caringbah hs
Vc caringbah hsVc caringbah hs
Vc caringbah hscarena
 

Similar to Hacker tooltalk: Social Engineering Toolkit (SET) (20)

Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10G
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss development
 
Hacking Rapidshare
Hacking RapidshareHacking Rapidshare
Hacking Rapidshare
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
 
Scalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureScalable JavaScript Application Architecture
Scalable JavaScript Application Architecture
 
Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada
 
FYP Presentation
FYP PresentationFYP Presentation
FYP Presentation
 
33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
 
Web 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business ModelsWeb 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business Models
 
Alt Dvb
Alt DvbAlt Dvb
Alt Dvb
 
31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada
 
Satellite With Alt Dvb
Satellite With Alt DvbSatellite With Alt Dvb
Satellite With Alt Dvb
 
Mobile Cloud Architectures
Mobile Cloud ArchitecturesMobile Cloud Architectures
Mobile Cloud Architectures
 
A Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesA Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption Strategies
 
Vc caringbah hs
Vc caringbah hsVc caringbah hs
Vc caringbah hs
 
Getting Started with DevOps
Getting Started with DevOpsGetting Started with DevOps
Getting Started with DevOps
 

More from Chris Hammond-Thrasher (13)

Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried out
 
Spiritualists, magicians and security vendors
Spiritualists, magicians and security vendorsSpiritualists, magicians and security vendors
Spiritualists, magicians and security vendors
 
hackers vs suits
hackers vs suitshackers vs suits
hackers vs suits
 
Introduction to Green IT
Introduction to Green ITIntroduction to Green IT
Introduction to Green IT
 
Hacker tool talk: kismet
Hacker tool talk: kismetHacker tool talk: kismet
Hacker tool talk: kismet
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Open Source Library Software
Open Source Library SoftwareOpen Source Library Software
Open Source Library Software
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
 
Popular GIS: a webliography
Popular GIS: a webliographyPopular GIS: a webliography
Popular GIS: a webliography
 
Popular GIS
Popular GISPopular GIS
Popular GIS
 
How hackers do it
How hackers do itHow hackers do it
How hackers do it
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...
CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...
CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...anilsa9823
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhisoniya singh
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service 🕶
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service  🕶CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service  🕶
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service 🕶anilsa9823
 
Dgital-Self-UTS-exploring-the-digital-self.pptx
Dgital-Self-UTS-exploring-the-digital-self.pptxDgital-Self-UTS-exploring-the-digital-self.pptx
Dgital-Self-UTS-exploring-the-digital-self.pptxsantosem70
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiAmil Baba Mangal Maseeh
 
Part 1 of the Holy Quran- Alif Laam Meem
Part 1 of the Holy Quran- Alif Laam MeemPart 1 of the Holy Quran- Alif Laam Meem
Part 1 of the Holy Quran- Alif Laam MeemAbdullahMohammed282920
 
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...baharayali
 
Sawwaf Calendar, 2024
Sawwaf Calendar, 2024Sawwaf Calendar, 2024
Sawwaf Calendar, 2024Bassem Matta
 
Codex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca SapientiaCodex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca Sapientiajfrenchau
 
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》2tofliij
 
VIP Call Girls Thane Vani 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Vani 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Vani 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Vani 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCRElite Class ➥8448380779▻ Call Girls In Naraina Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCRDelhi Call girls
 
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UK
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UKVashikaran Specialist in London Black Magic Removal No 1 Astrologer in UK
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UKAmil Baba Naveed Bangali
 
madina book to learn arabic part1
madina   book   to  learn  arabic  part1madina   book   to  learn  arabic  part1
madina book to learn arabic part1JoEssam
 
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun Jani
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun JaniPradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun Jani
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun JaniPradeep Bhanot
 
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️soniya singh
 
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...Black Magic Specialist
 
Lesson 3 - Heaven - the Christian's Destiny.pptx
Lesson 3 - Heaven - the Christian's Destiny.pptxLesson 3 - Heaven - the Christian's Destiny.pptx
Lesson 3 - Heaven - the Christian's Destiny.pptxCelso Napoleon
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...
CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...
CALL ON ➥8923113531 🔝Call Girls Indira Nagar Lucknow Lucknow best Night Fun s...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Chirag Delhi | Delhi
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service 🕶
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service  🕶CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service  🕶
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best Female service 🕶
 
Dgital-Self-UTS-exploring-the-digital-self.pptx
Dgital-Self-UTS-exploring-the-digital-self.pptxDgital-Self-UTS-exploring-the-digital-self.pptx
Dgital-Self-UTS-exploring-the-digital-self.pptx
 
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in KarachiNo.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Karachi
 
Part 1 of the Holy Quran- Alif Laam Meem
Part 1 of the Holy Quran- Alif Laam MeemPart 1 of the Holy Quran- Alif Laam Meem
Part 1 of the Holy Quran- Alif Laam Meem
 
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...
Top Astrologer, Kala ilam expert in Multan and Black magic specialist in Sind...
 
Sawwaf Calendar, 2024
Sawwaf Calendar, 2024Sawwaf Calendar, 2024
Sawwaf Calendar, 2024
 
Codex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca SapientiaCodex Singularity: Search for the Prisca Sapientia
Codex Singularity: Search for the Prisca Sapientia
 
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》
肄业证书结业证书《德国汉堡大学成绩单修改》Q微信741003700提供德国文凭照片可完整复刻汉堡大学毕业证精仿版本《【德国毕业证书】{汉堡大学文凭购买}》
 
VIP Call Girls Thane Vani 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Vani 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Vani 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Vani 8617697112 Independent Escort Service Thane
 
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCRElite Class ➥8448380779▻ Call Girls In Naraina Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Naraina Delhi NCR
 
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UK
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UKVashikaran Specialist in London Black Magic Removal No 1 Astrologer in UK
Vashikaran Specialist in London Black Magic Removal No 1 Astrologer in UK
 
madina book to learn arabic part1
madina   book   to  learn  arabic  part1madina   book   to  learn  arabic  part1
madina book to learn arabic part1
 
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun Jani
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun JaniPradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun Jani
Pradeep Bhanot - Friend, Philosopher Guide And The Brand By Arjun Jani
 
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️
Call Girls in sarojini nagar Delhi 8264348440 ✅ call girls ❤️
 
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...black magic specialist amil baba pakistan no 1 Black magic contact number rea...
black magic specialist amil baba pakistan no 1 Black magic contact number rea...
 
English - The Forgotten Books of Eden.pdf
English - The Forgotten Books of Eden.pdfEnglish - The Forgotten Books of Eden.pdf
English - The Forgotten Books of Eden.pdf
 
Call Girls In Nehru Place 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Nehru Place 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Nehru Place 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Nehru Place 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Lesson 3 - Heaven - the Christian's Destiny.pptx
Lesson 3 - Heaven - the Christian's Destiny.pptxLesson 3 - Heaven - the Christian's Destiny.pptx
Lesson 3 - Heaven - the Christian's Destiny.pptx
 

Hacker tooltalk: Social Engineering Toolkit (SET)

  • 1. Hacker tool talk: SET The Social Engineering Toolkit “Or how I learned to put tape over my webcam” Chris Hammond-Thrasher chris.hammond-thrasher <at> ca.fujitsu.com Fujitsu Edmonton Security Lab December 2011 Fujitsu Edmonton Security Lab 1
  • 2. Agenda • Why are we here? • What is social engineering? • Setting up a security lab • About SET and its dependencies • Installing SET • SET demo • What’s next? Fujitsu Edmonton Security Lab 2
  • 3. Why are we here? Fujitsu Edmonton Security Lab 3
  • 4. Ethics and motives “Every single scam in human history has worked for one key reason; the victim did not recognize it as a scam.” - R. Paul Wilson Fujitsu Edmonton Security Lab 4
  • 5. What is social engineering? Fujitsu Edmonton Security Lab 5
  • 6. Social science definition • “Social engineering is a discipline in political science that refers to efforts to influence popular attitudes and social behaviors on a large scale, whether by governments or private groups… For various reasons, the term has been imbued with negative connotations. However, virtually all law and governance has the effect of changing behavior and can be considered "social engineering" to some extent. Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging undesirable behaviors. In British and Canadian jurisprudence, changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries.” - Wikipedia (“social engineering (political science)” 26 October 2011) Fujitsu Edmonton Security Lab 6
  • 7. Information security definition • “We define it as the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action.” - Chris Hadnagy (social-engineer.org) Fujitsu Edmonton Security Lab 7
  • 8. Setting up a security lab Fujitsu Edmonton Security Lab 8
  • 9. Security lab reqs • It’s actually pretty easy to setup – A network • Isolated from other networks • Any wired hub, switch, or router and cable; wireless is an option; or the virtual network created by virtualization tools is also OK. • Recommendation: Keep it simple and go wired if you can – Attack/dev box • Linux or Unix is generally the best option, OS X is getting better support, or Windows as the least desirable OS. • Recommendation: OS: Backtrack Linux, Packet tool: Wireshark – Target box • Recommendation: OS: Windows (any) and VMWare (or your favorite virtualization tool) – Logging/monitoring box (Optional) • Recommendation: OS: Any, Packet tool: Wireshark Fujitsu Edmonton Security Lab 9
  • 10. Caution • This is not a game. Attacking machines with the tools in this presentation without permission is not only unethical, but is a criminal offense in many jurisdictions. Fujitsu Edmonton Security Lab 10
  • 11. About SET Fujitsu Edmonton Security Lab 11
  • 12. History • The Social Engineering Toolkit (SET) – An open source project lead by Dave Kennedy, Chief Information Security Officer of a Fortune 1000 company – Leverages the Metasploit Framework, FastTrack (another Dave Kennedy lead project), and other open source tools – Originally released in 2009 to coincide with the launch of social-engineer.org – “The Social-Engineering Toolkit (SET) is a python- driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social- engineering attacks and allow the tester to effectively test how a targeted attack may succeed.” - from the secmaniac.org download page Fujitsu Edmonton Security Lab 12
  • 13. Features • SET implements a variety of targeted attacks that fall into three main categories 1. Create malicious websites through site cloning or templates that launch Metasploit or Java applet attacks at clients 2. Create and send phishing and spearphishing emails 3. Create malicious files – PDFs, MS Office docs, EXEs, etc. • Free as in speech and beer Fujitsu Edmonton Security Lab 13
  • 14. Legit uses of SET • Penetration testing – with or without social engineering in scope – “Can an attacker still get shell when my firewall, IDS, and antivirus are awesome?” – “Can an attacker get shell on privately addressed machines behind my NATed firewall?” – “How can I check if my staff can be fooled into doing something stupid and placing the entire enterprise and our clients at risk?” Fujitsu Edmonton Security Lab 14
  • 15. h4X0r$ • Provide the technical components of social engineering attacks – “I think I can trick the CEO/CFO/Financial Analyst/DBA into clicking on a link or opening a file attachment that I email to her, but how do I create an evil site or file for her to hit?” – “If I am going to drop USB thumb drives in the target’s parking lot, what evil file should I put on it?” – “How can I encode my evil payload to evade antivirus?” Fujitsu Edmonton Security Lab 15
  • 16. Installing SET Fujitsu Edmonton Security Lab 16
  • 17. Choices • Easiest: Get latest Backtrack (BT5R1) http://www.backtrack-linux.org/downloads/ • Linux power user: Use svn to install the latest build (no compile required – it’s Python) svn co http://svn.secmaniac.com/social_engineering_toolkit set/ and firefox http://metasploit.com/download/ & (grab the latest stable Metasploit release and follow installation instructions) Fujitsu Edmonton Security Lab 17
  • 18. Configuration • Regardless of your installation method, open and edit the set_config file in the config directory of your SET installation (in Backtrack this is pentest/exploits/SET/config/set_config) • The configuration file is well commented – don’t be afraid Fujitsu Edmonton Security Lab 18
  • 19. SET demo Fujitsu Edmonton Security Lab 19
  • 20. SET demo • Starting it up • Updating SET and Metasploit • Menu tour • The Java applet attack vector • A quick look at post exploitation (or why I have tape over my webcam lens) Fujitsu Edmonton Security Lab 20
  • 21. 1. HTTP GET request on port 80 (initiated by the user) 2. HTTP RESPONSES with HTML and Java payload 3. Anti- Attacker’s Web Server virus? Victim’s Browser Victim’s Firewall 4. Run unsigned Java 4. Request TCP connection on port 443 applet? 5. Command and control session established Fujitsu Edmonton Security Lab 21
  • 22. What’s next Fujitsu Edmonton Security Lab 22
  • 23. Learn more • Read social-engineer.org and listen to their podcast • Read Chris Hadnagy’s Social Engineering: The Art of Human Hacking Fujitsu Edmonton Security Lab 23
  • 24. Act locally • At work – Show your colleagues how clicking on an innocent URL and then ignoring the Java applet warning can lead to their laptop turning into a spy-cam – Show your colleagues how scam emails can lead to your computer being compromised if you open attachments or follow links – even if you don’t reply to their pleas for financial help Fujitsu Edmonton Security Lab 24
  • 25. Act locally • At home – My family used to ignore my warnings about strange email attachments and URLs. Then one day I fired up the SET Java applet attack and emailed my daughter a URL with a message to check out “something cool”. Two minutes later I called her over to my machine and showed her a picture of herself that I had captured through her laptop’s webcam. Not only will she never follow a strange link again but she has covered her webcam lens with masking tape. Fujitsu Edmonton Security Lab 25
  • 26. Thank you! Want more presentations like this? Is there a particular tool or hack that you would like to see demoed? Fujitsu Edmonton Security Lab Chris Hammond-Thrasher Email: chris.hammond-thrasher <at> ca.fujitsu.com Twitter: @thrashor Yetunde Oladunni Email: yetundefashoro@gmail.com Fujitsu Edmonton Security Lab 26