social engineering

25
SOCIAL ENGINEERING THE HUMAN HACK By: Lance Howell

Upload: lance-howell

Post on 23-Dec-2014

476 views

Category:

Technology


0 download

DESCRIPTION

Learn about Human Hacking and the Art of social engineering. Learn a general overview of what is possible through some simple tools both technical and non-technical in nature. This presentation is aimed at educating the viewer into being more aware of what information they may be giving out even without knowing about it.

TRANSCRIPT

Page 1: Social Engineering

SOCIAL ENGINEERINGTHE HUMAN HACK

By: Lance Howell

Page 2: Social Engineering

A LITTLE ABOUT ME… VERY LITTLE.

•36 years old

•BS in Information Systems

Security

•Interests: Information

Security, Linux, web

development, and general

hacking

•Web Site: www.tech-

heaven.net

Page 3: Social Engineering

WHAT DO YOU THINK OF

L

iar

C

onman/Conartist

C

riminal

P

oliticians

A

ctor

P

erformer (Magician, Hypnotist, Comedian, etc)

Page 4: Social Engineering

STEPS OF AN ATTACKI

nformation Gathering

E

licitation

P

re-texting

I

nfluencing Others• Reciprocation• Scarcity• Authority• Commitment and Consistency• Liking• Consensus or Social Proof

Page 5: Social Engineering

PSYCHOLOGICAL PRINCIPLES TO STUDY

M

odes of Thinking

E

ye Cues

M

icro-Expressions

N

euro-Linguistic Programming (NLP)

I

nterview and Interrogation

E

stablish Rapport with the Person

Page 6: Social Engineering

MICROEXPRESSIONS

T

he small facial expressions and body language

that can be used to tell what a person is really

thinking or what they are feeling about the

conversation.

Page 7: Social Engineering

EXAMPLES OF MICROEXPRESSIONS

Page 8: Social Engineering

ANGER

1. Eyebrows are down and together.

2. Eyes glare.

3. Narrowing of lips.

Page 9: Social Engineering

CONTEMPT

1. Lip corner tight and raised on one side of face.

Page 10: Social Engineering

DISGUST

1. Narrowed eyes.

2. Wrinkled nose

3. Parted mouth

Page 11: Social Engineering

SAD

1. Creased forehead.

2. Eyes loosing focus.

3. Downturned mouth.

4. Wavering chin

Page 12: Social Engineering

FEAR

1. Raised eyebrows and pulled together.

2. Wide-open eyes.

3. Tensed lower eyelids.

4. Parted lips. Lips slightly stretched.

Page 13: Social Engineering

COMPUTER-BASED TOOLS

M

altego 3.0

M

altego Mesh: Firefox Plug-in (No longer supported or updated)

S

ocial Engineering Toolkit (SET): Good for E-Mail Based Attacks and Phishing

C

ommon User Password Profiler (CUPP)

C

ree.py BRAND NEW

Page 14: Social Engineering

MALTEGO 3.1

C

ommunity Edition vs. Commercial Edition

W

orks on Windows, MAC and Linux

P

rovides a graphical way to do several Linux

commands

Page 15: Social Engineering

MALTEGO MASHWHY USE IT???

F

ree

H

elps you find information quickly within a large page (no need to read an

entire blog that’s long to find an email address

Q

uickly search on facebook with email addresses instead of having to

browse to each site.

N

ot being developed anymore.

Page 16: Social Engineering

DEMONSTRATION OF MALTEGO 3

Page 17: Social Engineering

SOCIAL ENGINEERING TOOLKIT (SET)

T

ool designed to perform advanced attacks against a person or organization used

during a penetration test.

U

nder constant development (Be sure to update SET every couple of days) Current

Version 3.3

C

onfigure set_config file.

N

ew version includes a web GUI

T

raditional interface is an interactive menu driven interface

Page 18: Social Engineering

TYPES OF ATTACK VECTORS

Page 19: Social Engineering

SHODANHTTP://WWW.SHODANHQ.COM/

S

earch Engine for connected machines.

S

earch for computers that is connected to the

internet based on city, country, latitude/longitude,

hostname, operating system and IP

Page 20: Social Engineering

DEMONSTRATION OF SHODAN

Page 21: Social Engineering

CREE.PY ISN’T IT

Retrieves information from Twitter as well as Flickr

Gather geolocation data from flickr, twitpic.com,

yfrog.com, img.ly, plixi.com, twitrpix.com,

foleext.com, shozu.com, pickhur.com, moby.to,

twitsnaps.com, and twitgoo.com

Download it from

http://ilektrojohn.github.com/creepy/

Page 22: Social Engineering

DEMONSTRATION OF CREE.PY

Page 23: Social Engineering

CLOSING COMMENTS

W

ays to protect yourself against attacks

M

ore resources to further your knowledge and

education

Page 24: Social Engineering

WAYS TO PROTECT YOURSELF

E

ducate yourself and your staff on proper procedures when answering the

phone, e-mail, and questioning people.

D

o Not Click On Links in e-mails.

H

ave training in social engineering techniques. (Even a newsletter is better

than nothing)

Q

uestion people in your building that you do not know especially if the

building is not open to the public.

Page 25: Social Engineering

ADDITIONAL RESOURCES

w

ww.social-engineer.org

w

ww.offensive-security.com/metasploit-unleashed/

w

ww.secmaniac.com

S

ocial Engineering: The Art of Human Hacking by Chris Hadnagy

N

o Tech Hacking by Johnny Long

G

oogle Hacking by Johnny Long