SlideShare a Scribd company logo
SOCIAL ENGINEERING
VELAYUTHAM SELVARAJ
MSC IN DIGITAL FORENSICS AND CYBER CRIME ANALYSIS
ECHO BRAG
• CEO TWINTECH SOLUTIONS
• HACKERS DAY LEAD CHAPTER CHENNAI
• ECOMMERCE EXPERT
• FORENSIC INVESTIGATOR
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
SOCIAL ENGINEERING
• SOCIAL ENGINEERING IS THE TERM USED FOR A BROAD RANGE OF MALICIOUS
ACTIVITIES ACCOMPLISHED THROUGH HUMAN INTERACTIONS. IT USES
PSYCHOLOGICAL MANIPULATION TO TRICK USERS INTO MAKING SECURITY
MISTAKES OR GIVING AWAY SENSITIVE INFORMATION.
• TYPICALLY USES A DELIVERY TOOL, LIKE EMAIL, A WEB PAGE, OR A USB KEY, TO
INDUCE A TARGET TO SHARE SENSITIVE INFORMATION OR PERFORM AN ACTION
THAT ENABLES AN ATTACKER TO COMPROMISE THE SYSTEM.
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
TYPES OF SE ATTACKS
Phishing Watering hole
IVR Phishing Vhishing
Scareware Quid Pro Quo
Pretexting Piggybacking
Spear phishing Diversion Theft
Whaling Honeytrap
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
PHISHING
• PHISHING IS THE FRAUDULENT ATTEMPT TO OBTAIN SENSITIVE INFORMATION
SUCH AS USERNAMES, PASSWORDS, AND CREDIT CARD DETAILS (AND MONEY),
OFTEN FOR MALICIOUS REASONS, BY DISGUISING AS A TRUSTWORTHY ENTITY IN
AN ELECTRONIC COMMUNICATION.
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
A QUICK 2 MINUTE DEMO WITH SOCIALFISH
PREREQUISITES ( PLEASE VERIFY IF YOU HAVE INSTALLED )
• PYTHON 3
• WGET FROM PYTHON
• PHP
• SUDO
HTTPS://GITHUB.COM/AN0NUD4Y/SOCIALFISH
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
PUNY CODE PHISHING
• BY DEFAULT, MANY WEB BROWSERS USE THE XN-- PREFIX KNOWN AS AN ASCII
COMPATIBLE ENCODING PREFIX TO INDICATE TO THE WEB BROWSER THAT THE
DOMAIN USES PUNYCODE TO REPRESENT UNICODE CHARACTERS WHICH IS A
REASONABLE MEASURE TO DEFEND AGAINST HOMOGRAPH PHISHING ATTACKS.
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
TYPE THIS IN YOUR BROWSER
XN--PYTM-GR5A.COM
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
PHISHING 2 FA TOKENS
• EVILGINX BECOMES A RELAY BETWEEN THE REAL WEBSITE AND THE PHISHED USER.
PHISHED USER INTERACTS WITH THE REAL WEBSITE, WHILE EVILGINX CAPTURES ALL
THE DATA BEING TRANSMITTED BETWEEN THE TWO PARTIES.
• EVILGINX, BEING THE MAN-IN-THE-MIDDLE, CAPTURES NOT ONLY USERNAMES AND
PASSWORDS, BUT ALSO CAPTURES AUTHENTICATION TOKENS SENT AS COOKIES.
CAPTURED AUTHENTICATION TOKENS ALLOW THE ATTACKER TO BYPASS ANY FORM
OF 2FA ENABLED ON USER'S ACCOUNT
• EVEN IF PHISHED USER HAS 2FA ENABLED, THE ATTACKER, OUTFITTED WITH JUST A
DOMAIN AND A VPS SERVER, IS ABLE TO REMOTELY TAKE OVER HIS/HER ACCOUNT.
IT DOESN'T MATTER IF 2FA IS USING SMS CODES, MOBILE AUTHENTICATOR APP OR
RECOVERY KEYS.LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
QUICK DEMO
PREREQUISTES
• DEBIAN 8 VPS.
• DOMAIN NAME
• INSTALLED GO OF VERSION AT LEAST 1.10.0
• HTTPS://GITHUB.COM/KGRETZKY/EVILGINX2
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
COUNTERMEASURES
• TRAIN YOUR EMPLOYEES ON SECURITY AWARENESS
• FILTER EMAILS FOR PHISHING THREATS
• UPDATE CLIENT-SIDE OPERATING SYSTEMS, SOFTWARE, AND PLUG-INS
• HARDEN YOUR CLIENTS
• BLOCK INTERNET-BOUND SMB AND KERBEROS TRAFFIC
• DETECT MALWARE ON ENDPOINTS
• DETECT COMPROMISED CREDENTIALS AND LATERAL MOVEMENT
• IMPLEMENT U2F-FACTOR AUTHENTICATION
• HAVE AN INCIDENT RESPONSE PLAN
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
REFERENCE
• HTTPS://WWW.INCAPSULA.COM/WEB-APPLICATION-SECURITY/SOCIAL-
ENGINEERING-ATTACK.HTML
• HTTPS://WWW.KNOWBE4.COM/WHAT-IS-SOCIAL-ENGINEERING/
LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266

More Related Content

What's hot

Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity TheftDanielle Jobe
 
Password spraying
Password sprayingPassword spraying
Password spraying
Shalini Kaushik
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
Sucuri
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Muhammad Khan
 
Cyber security
Cyber security Cyber security
Cyber security
Tajwar khan
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013
Mihajlo Prerad
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
Naushad CEH, CHFI, MTA, ITIL
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
REVULN
 
Security Threat Presentation
Security Threat PresentationSecurity Threat Presentation
Security Threat Presentation
Robert Giannini
 
Fostering Trustworthy Digital Engagement
Fostering Trustworthy Digital EngagementFostering Trustworthy Digital Engagement
Fostering Trustworthy Digital Engagement
Digital Exeter
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
RapidSSLOnline.com
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
Sucuri
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )
Olivia martins
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
Ame Elliott
 
Document from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptxDocument from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptx
sidrasagheer1
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
Blue Coat
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
CrowdStrike
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
Hardik Ashok Kevadiya
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
 

What's hot (20)

Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity Theft
 
Password spraying
Password sprayingPassword spraying
Password spraying
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Cyber security
Cyber security Cyber security
Cyber security
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
 
Security Threat Presentation
Security Threat PresentationSecurity Threat Presentation
Security Threat Presentation
 
Fostering Trustworthy Digital Engagement
Fostering Trustworthy Digital EngagementFostering Trustworthy Digital Engagement
Fostering Trustworthy Digital Engagement
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
 
Document from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptxDocument from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptx
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns Cyber Security Extortion: Defending Against Digital Shakedowns
Cyber Security Extortion: Defending Against Digital Shakedowns
 
Recap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so farRecap of 2017's biggest cyber-incidents so far
Recap of 2017's biggest cyber-incidents so far
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 

Similar to Social engineering

Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
MaheshSwami19
 
CYBERSECURITY
CYBERSECURITYCYBERSECURITY
CYBERSECURITY
KeshavGarg153749
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
Phishing technology by chitta
Phishing technology by chittaPhishing technology by chitta
Phishing technology by chitta
Chittaranjan Das
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
lorzinian
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Raffa Learning Community
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
Bomgar
 
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
Ștefan Popa
 
Phishing
PhishingPhishing

Similar to Social engineering (20)

Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
CYBERSECURITY
CYBERSECURITYCYBERSECURITY
CYBERSECURITY
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Social engineering
Social engineering Social engineering
Social engineering
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Phishing technology by chitta
Phishing technology by chittaPhishing technology by chitta
Phishing technology by chitta
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?What is Network Security and Why is it Needed?
What is Network Security and Why is it Needed?
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
Security as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application developmentSecurity as a top of mind issue for mobile application development
Security as a top of mind issue for mobile application development
 
Phishing
PhishingPhishing
Phishing
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Social engineering

  • 1. SOCIAL ENGINEERING VELAYUTHAM SELVARAJ MSC IN DIGITAL FORENSICS AND CYBER CRIME ANALYSIS
  • 2. ECHO BRAG • CEO TWINTECH SOLUTIONS • HACKERS DAY LEAD CHAPTER CHENNAI • ECOMMERCE EXPERT • FORENSIC INVESTIGATOR LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 3. SOCIAL ENGINEERING • SOCIAL ENGINEERING IS THE TERM USED FOR A BROAD RANGE OF MALICIOUS ACTIVITIES ACCOMPLISHED THROUGH HUMAN INTERACTIONS. IT USES PSYCHOLOGICAL MANIPULATION TO TRICK USERS INTO MAKING SECURITY MISTAKES OR GIVING AWAY SENSITIVE INFORMATION. • TYPICALLY USES A DELIVERY TOOL, LIKE EMAIL, A WEB PAGE, OR A USB KEY, TO INDUCE A TARGET TO SHARE SENSITIVE INFORMATION OR PERFORM AN ACTION THAT ENABLES AN ATTACKER TO COMPROMISE THE SYSTEM. LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 4. TYPES OF SE ATTACKS Phishing Watering hole IVR Phishing Vhishing Scareware Quid Pro Quo Pretexting Piggybacking Spear phishing Diversion Theft Whaling Honeytrap LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 5. PHISHING • PHISHING IS THE FRAUDULENT ATTEMPT TO OBTAIN SENSITIVE INFORMATION SUCH AS USERNAMES, PASSWORDS, AND CREDIT CARD DETAILS (AND MONEY), OFTEN FOR MALICIOUS REASONS, BY DISGUISING AS A TRUSTWORTHY ENTITY IN AN ELECTRONIC COMMUNICATION. LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 6. A QUICK 2 MINUTE DEMO WITH SOCIALFISH PREREQUISITES ( PLEASE VERIFY IF YOU HAVE INSTALLED ) • PYTHON 3 • WGET FROM PYTHON • PHP • SUDO HTTPS://GITHUB.COM/AN0NUD4Y/SOCIALFISH LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 7. PUNY CODE PHISHING • BY DEFAULT, MANY WEB BROWSERS USE THE XN-- PREFIX KNOWN AS AN ASCII COMPATIBLE ENCODING PREFIX TO INDICATE TO THE WEB BROWSER THAT THE DOMAIN USES PUNYCODE TO REPRESENT UNICODE CHARACTERS WHICH IS A REASONABLE MEASURE TO DEFEND AGAINST HOMOGRAPH PHISHING ATTACKS. LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 8. TYPE THIS IN YOUR BROWSER XN--PYTM-GR5A.COM LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 9. PHISHING 2 FA TOKENS • EVILGINX BECOMES A RELAY BETWEEN THE REAL WEBSITE AND THE PHISHED USER. PHISHED USER INTERACTS WITH THE REAL WEBSITE, WHILE EVILGINX CAPTURES ALL THE DATA BEING TRANSMITTED BETWEEN THE TWO PARTIES. • EVILGINX, BEING THE MAN-IN-THE-MIDDLE, CAPTURES NOT ONLY USERNAMES AND PASSWORDS, BUT ALSO CAPTURES AUTHENTICATION TOKENS SENT AS COOKIES. CAPTURED AUTHENTICATION TOKENS ALLOW THE ATTACKER TO BYPASS ANY FORM OF 2FA ENABLED ON USER'S ACCOUNT • EVEN IF PHISHED USER HAS 2FA ENABLED, THE ATTACKER, OUTFITTED WITH JUST A DOMAIN AND A VPS SERVER, IS ABLE TO REMOTELY TAKE OVER HIS/HER ACCOUNT. IT DOESN'T MATTER IF 2FA IS USING SMS CODES, MOBILE AUTHENTICATOR APP OR RECOVERY KEYS.LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 10. QUICK DEMO PREREQUISTES • DEBIAN 8 VPS. • DOMAIN NAME • INSTALLED GO OF VERSION AT LEAST 1.10.0 • HTTPS://GITHUB.COM/KGRETZKY/EVILGINX2 LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266
  • 11. COUNTERMEASURES • TRAIN YOUR EMPLOYEES ON SECURITY AWARENESS • FILTER EMAILS FOR PHISHING THREATS • UPDATE CLIENT-SIDE OPERATING SYSTEMS, SOFTWARE, AND PLUG-INS • HARDEN YOUR CLIENTS • BLOCK INTERNET-BOUND SMB AND KERBEROS TRAFFIC • DETECT MALWARE ON ENDPOINTS • DETECT COMPROMISED CREDENTIALS AND LATERAL MOVEMENT • IMPLEMENT U2F-FACTOR AUTHENTICATION • HAVE AN INCIDENT RESPONSE PLAN LEARN ETHICHAL HACKING COURSE CONTACTUS 9677034266