SlideShare a Scribd company logo
Social Engineering and its 
importance in Penetration Testing
Agenda for Social Engineering: 
• What is Social Engineering (SE) ? 
• Fundamental principals guiding the success of SE 
• Case Study Demonstration 
• Macroexpressions & Body Language 
• Microexpressions 
• Importance of SE during Audit or SE PenTesting 
• Counter Measures for SE
What is Social Engineering? 
“Act of influencing a person to take action that may or may not be in target’s 
interest” 
Good Social Engineers: 
Parents, 
Doctors, 
Criminal Psychologists, 
Negotiators, 
Salespersons, 
Diplomats, 
Whistle-blowers, 
Magicians 
Bad Social Engineers: 
Fraudsters, 
Confidence tricksters 
Malicious Insiders, 
Espionage Agents, 
Double-Agents, 
Blackmailers, 
Human Traffickers, 
Terrorists
Fundamental principals guiding the success of SE 
Reciprocation: 
We are hard-wired to respond to a favour, often not in direct proportion to 
the size of the favour done to us. 
Commitment and Consistency: 
Once we have made a choice or taken a stand, we will encounter 
personal and inter-personal pressures to behave consistently with that 
commitment. 
Social Proof: 
One means we use to determine what is correct is to find out what 
other people think is correct. The principle applies especially to the 
way we decide what constitutes correct behaviour. 
Liking: As a rule, we prefer to say yes to the requests of someone we 
know and like 
Authority: The real culprit is our inability to resist the psychological power 
wielded by the person in authority. 
The influence of the scarcity principle in determining the worth of an 
item. 
Scarcity:
Examples
Examples (contd…)
Case Study: Reliance Canteen episode 
Objective 
During our graduation days, we planned have food from the canteen without 
paying huge bills when our friend group grew large in size. 
The Opportunity 
Those days, Reliance had launched an offer that enabled you to talk free between 
2 sims if you buy them. 
The SE Attack 
We gave the 2 sims to canteen serving boy for having him to talk “as much as he 
desires” to his village. We made an understanding that whenever our friend circle was 
visiting canteen, he will bring extra samosas or cold drinks without charging us extra 
on them. 
The Effect 
We used to get almost double the food for the price of few items or the half of the 
price. This went on un-noticed for 7-8 months after which the plan failed.
Case Study: Analysis 
• Why did the plan work? 
• What could have caused failure of plan after 7-8 months? 
• What could have happened if we were caught earlier ?
Macro-expressions / Body language 
Macro-expression / Body language is a form of mental and physical ability of human 
non-verbal communication, which consists of body posture, gestures, facial expressions, 
and eye movements. Humans send and interpret such signals almost entirely 
subconsciously. 
Communication consists of : 
• 7% of what we say 
• 38% vocal(tone, accent, dialect) 
• 55% Non Verbal 
Non Verbal behaviour is depicted fundamentally by some body parts and how 
they act: 
• Feet/Legs (Most Accurate) 
• Torso 
• Hands 
• Neck 
• Mouth 
• Face (Least Accurate)
Macro-expressions :An Analysis
Pop Quiz: Identify this expression?
Micro-expressions 
A micro-expression is a brief, involuntary facial expression shown on the face of humans 
according to emotions experienced. 
Characteristics of micro-expressions: 
• They are very brief in duration, lasting only 1/25 to 1/15 of a second. 
• Highly Accurate in depicting the "actual" thought of the person. 
• Almost involuntary reflexes barely felt by the subject 
• Express the seven universal emotions: disgust, anger, fear, sadness, happiness, 
surprise, and contempt 
• It is difficult to hide micro-expression reactions
Puppy Dog Eyes Expression 
With whom you’d rather share your biscuit with?? 
Can you give me a 
biscuit? Please…… 
May I join in too? 
Please…… 
Where is MY biscuit? 
GIVE IT TO ME NOW !! Or else……. 
Animals too…..are able to Social engineer us successfully !! 
Social Engineering Trends : At a Glance
Social Engineering Trends : At a Glance
Importance of Social engineering during Security 
Audits and PenTesting exercise
Controlling your Micro & Macro expressions during Audit 
If you are stuck during conducting a social engineering exercise, the following 
tips might help for successfully carrying out testing: 
• On confronting an anti social or angry person; frown a bit and tilt your head by 
relaxing your shoulders. This indicates you are interested to hear him/her out and are 
not confronting directly. 
• Enter with a sad expression, the subject will involuntary feel sympathetic for you 
and will offer to help in most cases. 
• A friendly and warm reception always has higher chances of information retrieval 
than a rash or unfriendly behavior 
• Do everything in confidence even you know you are trapped. 
• Dress up nicely (as per occasion) and walk in short sure steps. It gives an impression 
of authority and people are much likely to yield under this charismatic effect.
Counter Measures for Social Engineering 
Source: www.hackers5.com
Food for thought…….
Food for thought…….
Recent News: 
• http://www.bbc.com/news/entertainment-arts-29017642c 
• http://fortune.com/2014/09/18/tim-cook-apple-sells-security-google- 
sells-you 
• http://en.wikipedia.org/wiki/Criticism_of_Apple_Inc.#Collabora 
tion_with_the_NSA
Must Have Resources 
• Social Engineering: The Art of Human Hacking by Christopher Hadnagy 
• The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick 
• Influence: The Psychology of Persuasion by Robert B. Cialdini 
Links 
• Video: Nonverbal Human Hacking Derbycon 2012 
http://www.irongeek.com/i.php?page=videos/derbycon2/2-1-2-chris-hadnagy-nonverbal- 
human-hacking 
• Body Language – Expressions on Google Android App Store: 
https://play.google.com/store/apps/details?id=com.Mazuzu.ExpressionTraining&hl=en
Golden rule for thwarting social 
engineering attacks 
TRUST, BUT VERIFY
After All………
THANK YOU !!! 
Presented By: 
Manasdeep
Questions ?

More Related Content

What's hot

20 cognitive biases that affect your decision
20 cognitive biases that affect your decision20 cognitive biases that affect your decision
20 cognitive biases that affect your decision
Alan Haller
 
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
Jim McKay
 
Thinking Fast & Slow presentation
Thinking Fast & Slow presentationThinking Fast & Slow presentation
Thinking Fast & Slow presentation
Laure Parsons
 
Stepping out of the play zone, 9 May 2017
Stepping out of the play zone, 9 May 2017Stepping out of the play zone, 9 May 2017
Stepping out of the play zone, 9 May 2017
Association for Project Management
 
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
AgileSparks
 
Proactive journalism
Proactive journalismProactive journalism
Proactive journalism
David Brewer
 
Exploiting Fast and Slow Thinking
Exploiting Fast and Slow ThinkingExploiting Fast and Slow Thinking
Exploiting Fast and Slow Thinking
Rebecca Wirfs-Brock
 
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARDSWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
Sanjay Bhatikar Ph.D., PMP
 
Frame Your Campaign To Win
Frame Your Campaign To WinFrame Your Campaign To Win
Frame Your Campaign To Win
Resource Media
 
The Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic ToolsThe Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic Tools
Strategic Counselor; Rowan University-Associate Professor, Ret.
 
The Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic ToolsThe Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic Tools
Strategic Counselor; Rowan University-Associate Professor, Ret.
 
Media Relations 101: Making Headlines
Media Relations 101: Making HeadlinesMedia Relations 101: Making Headlines
Media Relations 101: Making Headlines
Resource Media
 
Cognitive Biases and Bayesian reasoning
Cognitive Biases and Bayesian reasoningCognitive Biases and Bayesian reasoning
Cognitive Biases and Bayesian reasoning
Mauro DG
 
You're not so smart - Cognitive Biases
You're not so smart - Cognitive BiasesYou're not so smart - Cognitive Biases
You're not so smart - Cognitive Biases
Odair Faléco
 
Distilling the crowd: the next evolutionary step in crowd wisdom
Distilling the crowd: the next evolutionary step in crowd wisdomDistilling the crowd: the next evolutionary step in crowd wisdom
Distilling the crowd: the next evolutionary step in crowd wisdom
MRS
 
Data Analysis on Speed Dating
Data Analysis on Speed DatingData Analysis on Speed Dating
Data Analysis on Speed Dating
ShivenderDahiya07
 
Beyond Measure, Erika Hall
Beyond Measure, Erika HallBeyond Measure, Erika Hall
Beyond Measure, Erika Hall
Future Insights
 
Heweb social
Heweb socialHeweb social
Heweb social
Amy Grace Wells
 
Cognitive biases - Logic vs. The brain
Cognitive biases - Logic vs. The brainCognitive biases - Logic vs. The brain
Cognitive biases - Logic vs. The brain
Aditya Shukla
 

What's hot (20)

20 cognitive biases that affect your decision
20 cognitive biases that affect your decision20 cognitive biases that affect your decision
20 cognitive biases that affect your decision
 
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
Educating Decision Makers & Telling Our Story: Advocacy Lessons from the Wiza...
 
Thinking Fast & Slow presentation
Thinking Fast & Slow presentationThinking Fast & Slow presentation
Thinking Fast & Slow presentation
 
Stepping out of the play zone, 9 May 2017
Stepping out of the play zone, 9 May 2017Stepping out of the play zone, 9 May 2017
Stepping out of the play zone, 9 May 2017
 
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
Fearless Change - Myths and Patterns of Organizational Change Tutorial - Lind...
 
Thinking
ThinkingThinking
Thinking
 
Proactive journalism
Proactive journalismProactive journalism
Proactive journalism
 
Exploiting Fast and Slow Thinking
Exploiting Fast and Slow ThinkingExploiting Fast and Slow Thinking
Exploiting Fast and Slow Thinking
 
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARDSWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
SWITCH - HOW TO CHANGE THINGS WHEN CHANGE IS HARD
 
Frame Your Campaign To Win
Frame Your Campaign To WinFrame Your Campaign To Win
Frame Your Campaign To Win
 
The Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic ToolsThe Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic Tools
 
The Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic ToolsThe Dynamic Dozen (plus three) Strategic Tools
The Dynamic Dozen (plus three) Strategic Tools
 
Media Relations 101: Making Headlines
Media Relations 101: Making HeadlinesMedia Relations 101: Making Headlines
Media Relations 101: Making Headlines
 
Cognitive Biases and Bayesian reasoning
Cognitive Biases and Bayesian reasoningCognitive Biases and Bayesian reasoning
Cognitive Biases and Bayesian reasoning
 
You're not so smart - Cognitive Biases
You're not so smart - Cognitive BiasesYou're not so smart - Cognitive Biases
You're not so smart - Cognitive Biases
 
Distilling the crowd: the next evolutionary step in crowd wisdom
Distilling the crowd: the next evolutionary step in crowd wisdomDistilling the crowd: the next evolutionary step in crowd wisdom
Distilling the crowd: the next evolutionary step in crowd wisdom
 
Data Analysis on Speed Dating
Data Analysis on Speed DatingData Analysis on Speed Dating
Data Analysis on Speed Dating
 
Beyond Measure, Erika Hall
Beyond Measure, Erika HallBeyond Measure, Erika Hall
Beyond Measure, Erika Hall
 
Heweb social
Heweb socialHeweb social
Heweb social
 
Cognitive biases - Logic vs. The brain
Cognitive biases - Logic vs. The brainCognitive biases - Logic vs. The brain
Cognitive biases - Logic vs. The brain
 

Viewers also liked

Permenkeu171 pmk-02-2013 dipa
Permenkeu171 pmk-02-2013 dipaPermenkeu171 pmk-02-2013 dipa
Permenkeu171 pmk-02-2013 dipayunussetyawan07
 
Intervention Presentation
Intervention PresentationIntervention Presentation
Intervention Presentation
aithnedell
 
Media Studies Evaluation // Technologies
Media Studies Evaluation // TechnologiesMedia Studies Evaluation // Technologies
Media Studies Evaluation // Technologies
ktnesbitt
 
The CDKN2A
The CDKN2AThe CDKN2A
The CDKN2ARpat8312
 
Ancillary pitch
Ancillary pitch Ancillary pitch
Ancillary pitch
sahebayas
 
Treatment for music video
Treatment for music videoTreatment for music video
Treatment for music video
ktnesbitt
 
Theory
Theory Theory
Theory
sahebayas
 
Evaluation: Technologies
Evaluation: TechnologiesEvaluation: Technologies
Evaluation: Technologies
ktnesbitt
 
Evaluation // Technologies
Evaluation // TechnologiesEvaluation // Technologies
Evaluation // Technologies
ktnesbitt
 
K3(keselamatan,keamanan dan kesehatan)
K3(keselamatan,keamanan dan kesehatan)K3(keselamatan,keamanan dan kesehatan)
K3(keselamatan,keamanan dan kesehatan)
yunussetyawan07
 
Story board
Story boardStory board
Story board
ktnesbitt
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Nov
prashsiv
 
Gushat media and advertising new ppt22
Gushat media and advertising   new ppt22Gushat media and advertising   new ppt22
Gushat media and advertising new ppt22Gushat Gushat
 
Accademia del Blogger
Accademia del BloggerAccademia del Blogger
Accademia del Blogger
Emiliano Amici
 
Ancillary pitch
Ancillary pitch Ancillary pitch
Ancillary pitch
sahebayas
 
Divorcio wanda procedimientos civiles
Divorcio wanda procedimientos civilesDivorcio wanda procedimientos civiles
Divorcio wanda procedimientos civiles
Donna Madrid
 
Coaxial feed microstrip patch antenna using HFSS
 Coaxial feed microstrip patch antenna using  HFSS Coaxial feed microstrip patch antenna using  HFSS
Coaxial feed microstrip patch antenna using HFSS
Mithilesh Naphade
 

Viewers also liked (17)

Permenkeu171 pmk-02-2013 dipa
Permenkeu171 pmk-02-2013 dipaPermenkeu171 pmk-02-2013 dipa
Permenkeu171 pmk-02-2013 dipa
 
Intervention Presentation
Intervention PresentationIntervention Presentation
Intervention Presentation
 
Media Studies Evaluation // Technologies
Media Studies Evaluation // TechnologiesMedia Studies Evaluation // Technologies
Media Studies Evaluation // Technologies
 
The CDKN2A
The CDKN2AThe CDKN2A
The CDKN2A
 
Ancillary pitch
Ancillary pitch Ancillary pitch
Ancillary pitch
 
Treatment for music video
Treatment for music videoTreatment for music video
Treatment for music video
 
Theory
Theory Theory
Theory
 
Evaluation: Technologies
Evaluation: TechnologiesEvaluation: Technologies
Evaluation: Technologies
 
Evaluation // Technologies
Evaluation // TechnologiesEvaluation // Technologies
Evaluation // Technologies
 
K3(keselamatan,keamanan dan kesehatan)
K3(keselamatan,keamanan dan kesehatan)K3(keselamatan,keamanan dan kesehatan)
K3(keselamatan,keamanan dan kesehatan)
 
Story board
Story boardStory board
Story board
 
Security News Byes- Nov
Security News Byes- NovSecurity News Byes- Nov
Security News Byes- Nov
 
Gushat media and advertising new ppt22
Gushat media and advertising   new ppt22Gushat media and advertising   new ppt22
Gushat media and advertising new ppt22
 
Accademia del Blogger
Accademia del BloggerAccademia del Blogger
Accademia del Blogger
 
Ancillary pitch
Ancillary pitch Ancillary pitch
Ancillary pitch
 
Divorcio wanda procedimientos civiles
Divorcio wanda procedimientos civilesDivorcio wanda procedimientos civiles
Divorcio wanda procedimientos civiles
 
Coaxial feed microstrip patch antenna using HFSS
 Coaxial feed microstrip patch antenna using  HFSS Coaxial feed microstrip patch antenna using  HFSS
Coaxial feed microstrip patch antenna using HFSS
 

Similar to Social Engineering and importance in pentesting null OWASP G4H september meet

Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
n|u - The Open Security Community
 
Why Customers Hate Surveys!
Why Customers Hate Surveys! Why Customers Hate Surveys!
Why Customers Hate Surveys!
Tim Hey
 
Communication Hacks: Strategies for fostering collaboration and dealing with ...
Communication Hacks: Strategies for fostering collaboration and dealing with ...Communication Hacks: Strategies for fostering collaboration and dealing with ...
Communication Hacks: Strategies for fostering collaboration and dealing with ...
All Things Open
 
There is no 'I' in marketing - Gastles UA 2015
There is no 'I' in marketing - Gastles UA 2015There is no 'I' in marketing - Gastles UA 2015
There is no 'I' in marketing - Gastles UA 2015
Ruben Van Goethem
 
Resilience & networking sans video
Resilience & networking sans videoResilience & networking sans video
Resilience & networking sans video
Jerry Goebel, MBA, D.Min.
 
Persuasion architectures: Nudging People to do the Right Thing
Persuasion architectures: Nudging People to do the Right ThingPersuasion architectures: Nudging People to do the Right Thing
Persuasion architectures: Nudging People to do the Right Thing
User Vision
 
Humans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for ITHumans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for IT
Michele Chubirka
 
How to deal with difficult people - Timothy Dimoff
How to deal with difficult people - Timothy DimoffHow to deal with difficult people - Timothy Dimoff
How to deal with difficult people - Timothy Dimoff
Case IQ
 
Science Exchange Communication Workshop Nov 2015
Science Exchange Communication Workshop Nov 2015Science Exchange Communication Workshop Nov 2015
Science Exchange Communication Workshop Nov 2015
Hannah Knapp
 
WePay XLT Communication Workshop
WePay XLT Communication WorkshopWePay XLT Communication Workshop
WePay XLT Communication Workshop
Hannah Knapp
 
SMCFW - SXSW Downloaded
SMCFW - SXSW DownloadedSMCFW - SXSW Downloaded
SMCFW - SXSW Downloaded
Social Media Club Fort Worth
 
Designing for behaviour change
Designing for behaviour changeDesigning for behaviour change
Designing for behaviour change
Phil Barrett
 
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
Jim McKay
 
Secrets and lies sept 18 1
Secrets and lies sept 18 1Secrets and lies sept 18 1
Secrets and lies sept 18 1Eric Espinosa
 
Y&R Study Results: Secrets and lies sept 19
Y&R Study Results: Secrets and lies sept 19Y&R Study Results: Secrets and lies sept 19
Y&R Study Results: Secrets and lies sept 19
Leonard Murphy
 
Founder Leadership Workshop YC alumni
Founder Leadership Workshop YC alumniFounder Leadership Workshop YC alumni
Founder Leadership Workshop YC alumni
Hannah Knapp
 
7 habits of highly effective people interactive and engaging
7 habits of highly effective people interactive and engaging7 habits of highly effective people interactive and engaging
7 habits of highly effective people interactive and engaging
Dewey Alfonso
 
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
Planned Parenthood Advocates of Wisconsin
 

Similar to Social Engineering and importance in pentesting null OWASP G4H september meet (20)

Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
 
Why Customers Hate Surveys!
Why Customers Hate Surveys! Why Customers Hate Surveys!
Why Customers Hate Surveys!
 
Communication Hacks: Strategies for fostering collaboration and dealing with ...
Communication Hacks: Strategies for fostering collaboration and dealing with ...Communication Hacks: Strategies for fostering collaboration and dealing with ...
Communication Hacks: Strategies for fostering collaboration and dealing with ...
 
There is no 'I' in marketing - Gastles UA 2015
There is no 'I' in marketing - Gastles UA 2015There is no 'I' in marketing - Gastles UA 2015
There is no 'I' in marketing - Gastles UA 2015
 
Resilience & networking sans video
Resilience & networking sans videoResilience & networking sans video
Resilience & networking sans video
 
Persuasion architectures: Nudging People to do the Right Thing
Persuasion architectures: Nudging People to do the Right ThingPersuasion architectures: Nudging People to do the Right Thing
Persuasion architectures: Nudging People to do the Right Thing
 
Humans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for ITHumans Aren’t Computers: Effective Leadership Strategies for IT
Humans Aren’t Computers: Effective Leadership Strategies for IT
 
How to deal with difficult people - Timothy Dimoff
How to deal with difficult people - Timothy DimoffHow to deal with difficult people - Timothy Dimoff
How to deal with difficult people - Timothy Dimoff
 
Science Exchange Communication Workshop Nov 2015
Science Exchange Communication Workshop Nov 2015Science Exchange Communication Workshop Nov 2015
Science Exchange Communication Workshop Nov 2015
 
WePay XLT Communication Workshop
WePay XLT Communication WorkshopWePay XLT Communication Workshop
WePay XLT Communication Workshop
 
SMCFW - SXSW Downloaded
SMCFW - SXSW DownloadedSMCFW - SXSW Downloaded
SMCFW - SXSW Downloaded
 
Designing for behaviour change
Designing for behaviour changeDesigning for behaviour change
Designing for behaviour change
 
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
Advocacy Lessons from the Wizard of Oz - Policy Presentation at Prevent Child...
 
Secrets and lies sept 18 1
Secrets and lies sept 18 1Secrets and lies sept 18 1
Secrets and lies sept 18 1
 
Y&R Study Results: Secrets and lies sept 19
Y&R Study Results: Secrets and lies sept 19Y&R Study Results: Secrets and lies sept 19
Y&R Study Results: Secrets and lies sept 19
 
Founder Leadership Workshop YC alumni
Founder Leadership Workshop YC alumniFounder Leadership Workshop YC alumni
Founder Leadership Workshop YC alumni
 
4. introduction to feedback
4. introduction to feedback4. introduction to feedback
4. introduction to feedback
 
7 habits of highly effective people interactive and engaging
7 habits of highly effective people interactive and engaging7 habits of highly effective people interactive and engaging
7 habits of highly effective people interactive and engaging
 
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
C 1 ppt impact of trauma...and resultant sexual behavior shs 2015
 
Refresher module
Refresher moduleRefresher module
Refresher module
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Social Engineering and importance in pentesting null OWASP G4H september meet

  • 1. Social Engineering and its importance in Penetration Testing
  • 2. Agenda for Social Engineering: • What is Social Engineering (SE) ? • Fundamental principals guiding the success of SE • Case Study Demonstration • Macroexpressions & Body Language • Microexpressions • Importance of SE during Audit or SE PenTesting • Counter Measures for SE
  • 3. What is Social Engineering? “Act of influencing a person to take action that may or may not be in target’s interest” Good Social Engineers: Parents, Doctors, Criminal Psychologists, Negotiators, Salespersons, Diplomats, Whistle-blowers, Magicians Bad Social Engineers: Fraudsters, Confidence tricksters Malicious Insiders, Espionage Agents, Double-Agents, Blackmailers, Human Traffickers, Terrorists
  • 4. Fundamental principals guiding the success of SE Reciprocation: We are hard-wired to respond to a favour, often not in direct proportion to the size of the favour done to us. Commitment and Consistency: Once we have made a choice or taken a stand, we will encounter personal and inter-personal pressures to behave consistently with that commitment. Social Proof: One means we use to determine what is correct is to find out what other people think is correct. The principle applies especially to the way we decide what constitutes correct behaviour. Liking: As a rule, we prefer to say yes to the requests of someone we know and like Authority: The real culprit is our inability to resist the psychological power wielded by the person in authority. The influence of the scarcity principle in determining the worth of an item. Scarcity:
  • 7. Case Study: Reliance Canteen episode Objective During our graduation days, we planned have food from the canteen without paying huge bills when our friend group grew large in size. The Opportunity Those days, Reliance had launched an offer that enabled you to talk free between 2 sims if you buy them. The SE Attack We gave the 2 sims to canteen serving boy for having him to talk “as much as he desires” to his village. We made an understanding that whenever our friend circle was visiting canteen, he will bring extra samosas or cold drinks without charging us extra on them. The Effect We used to get almost double the food for the price of few items or the half of the price. This went on un-noticed for 7-8 months after which the plan failed.
  • 8. Case Study: Analysis • Why did the plan work? • What could have caused failure of plan after 7-8 months? • What could have happened if we were caught earlier ?
  • 9. Macro-expressions / Body language Macro-expression / Body language is a form of mental and physical ability of human non-verbal communication, which consists of body posture, gestures, facial expressions, and eye movements. Humans send and interpret such signals almost entirely subconsciously. Communication consists of : • 7% of what we say • 38% vocal(tone, accent, dialect) • 55% Non Verbal Non Verbal behaviour is depicted fundamentally by some body parts and how they act: • Feet/Legs (Most Accurate) • Torso • Hands • Neck • Mouth • Face (Least Accurate)
  • 11. Pop Quiz: Identify this expression?
  • 12. Micro-expressions A micro-expression is a brief, involuntary facial expression shown on the face of humans according to emotions experienced. Characteristics of micro-expressions: • They are very brief in duration, lasting only 1/25 to 1/15 of a second. • Highly Accurate in depicting the "actual" thought of the person. • Almost involuntary reflexes barely felt by the subject • Express the seven universal emotions: disgust, anger, fear, sadness, happiness, surprise, and contempt • It is difficult to hide micro-expression reactions
  • 13. Puppy Dog Eyes Expression With whom you’d rather share your biscuit with?? Can you give me a biscuit? Please…… May I join in too? Please…… Where is MY biscuit? GIVE IT TO ME NOW !! Or else……. Animals too…..are able to Social engineer us successfully !! 
  • 14. Social Engineering Trends : At a Glance
  • 15. Social Engineering Trends : At a Glance
  • 16. Importance of Social engineering during Security Audits and PenTesting exercise
  • 17. Controlling your Micro & Macro expressions during Audit If you are stuck during conducting a social engineering exercise, the following tips might help for successfully carrying out testing: • On confronting an anti social or angry person; frown a bit and tilt your head by relaxing your shoulders. This indicates you are interested to hear him/her out and are not confronting directly. • Enter with a sad expression, the subject will involuntary feel sympathetic for you and will offer to help in most cases. • A friendly and warm reception always has higher chances of information retrieval than a rash or unfriendly behavior • Do everything in confidence even you know you are trapped. • Dress up nicely (as per occasion) and walk in short sure steps. It gives an impression of authority and people are much likely to yield under this charismatic effect.
  • 18. Counter Measures for Social Engineering Source: www.hackers5.com
  • 21. Recent News: • http://www.bbc.com/news/entertainment-arts-29017642c • http://fortune.com/2014/09/18/tim-cook-apple-sells-security-google- sells-you • http://en.wikipedia.org/wiki/Criticism_of_Apple_Inc.#Collabora tion_with_the_NSA
  • 22. Must Have Resources • Social Engineering: The Art of Human Hacking by Christopher Hadnagy • The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick • Influence: The Psychology of Persuasion by Robert B. Cialdini Links • Video: Nonverbal Human Hacking Derbycon 2012 http://www.irongeek.com/i.php?page=videos/derbycon2/2-1-2-chris-hadnagy-nonverbal- human-hacking • Body Language – Expressions on Google Android App Store: https://play.google.com/store/apps/details?id=com.Mazuzu.ExpressionTraining&hl=en
  • 23. Golden rule for thwarting social engineering attacks TRUST, BUT VERIFY
  • 25. THANK YOU !!! Presented By: Manasdeep