social engineering networks reid chapman ciaran hannigan

19
Social Engineering Networks Reid Chapman Ciaran Hannigan

Upload: william-martin

Post on 18-Dec-2015

222 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Social Engineering Networks Reid Chapman Ciaran Hannigan

Social Engineering Networks

Reid Chapman

Ciaran Hannigan

Page 2: Social Engineering Networks Reid Chapman Ciaran Hannigan

What is Social Engineering

Social Engineering is the art of manipulating people into performing actions or divulging confidential information.

This type of attack is non-technical and rely heavily on human interaction.

Page 3: Social Engineering Networks Reid Chapman Ciaran Hannigan

Social Engineering

Hackers use Social Engineering attacks to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system.

Page 4: Social Engineering Networks Reid Chapman Ciaran Hannigan

History of Social Engineering

The term Social Engineering was made popular ex-computer criminal Kevin Mitnick.

Confessed to illegally accessing private networks and possession of forged documents.

Claimed to of only used Social Engineering techniques with no help from software programs.

Page 5: Social Engineering Networks Reid Chapman Ciaran Hannigan

Types of Attacks

PretextingOn-Line Social EngineeringReverse Social Engineering Phone Social Engineering

Page 6: Social Engineering Networks Reid Chapman Ciaran Hannigan

Pretexting

The act of creating and using an invented situation in order to convince a target to release information or grant access to sensitive materials.

This type of attack is usually implemented over the phone and can be used to obtain customer information, phone records, banking records and is also used by private investigators.

Page 7: Social Engineering Networks Reid Chapman Ciaran Hannigan

Pretexting cont’

The hacker will disguise their identity in order to ask a series of questions intended to get the information he/she is wanting from their target.

By asking these questions the victim will unknowingly provide the attacker with all the information the hacker needs to carry out their attack.

Page 8: Social Engineering Networks Reid Chapman Ciaran Hannigan

Online Social Engineering

This attack exploits the fact that many users use the same password for all their accounts online such as for their e-mail, banking, or facebook accounts.

So once an attacker has access to one account he/she has admittance to all of them.

Page 9: Social Engineering Networks Reid Chapman Ciaran Hannigan

Online cont’

Another common online attack is for a hacker to pretend to be a network admin and send out emails which request usernames and passwords, this attack is not as common or successful because people have become more conscious of this type of attack.

Page 10: Social Engineering Networks Reid Chapman Ciaran Hannigan

Reverse Social Engineering

Probably the least used of the attacks.Requires extensive research and planning.The key is to establish yourself in a

position of authority and have your targets come to you.

Giving you a better chance of retrieving info.

Page 11: Social Engineering Networks Reid Chapman Ciaran Hannigan

Reverse Social Engineering

This form of attack can be divided into three stages.

Stage one - Sabotage: Cause a problem (Crash the network)

Stage two - Advertise: Send out notice that you are the one to go to to solve the problem.

Stage three - Assist: Help the employees and get from them the info you came for.

When all is done you fix the problem, leave, and no one is the wiser because the problem is fixed and everyone is happy.

Page 12: Social Engineering Networks Reid Chapman Ciaran Hannigan

Phone Social Engineering

The most common practice of social engineering

A Hacker will call someone up and imitate a person of authority and slowly retrieve information from them.

Help Desks are incredible vunerable to this type of attack.

Page 13: Social Engineering Networks Reid Chapman Ciaran Hannigan

Help Desks are Gold Mines

Its main purpose is to help. Putting them at a disadvantage against an attacker.

People employed at a help desk usually are being paid next to nothing. Giving them little incentive to do anything but answer the questions and move onto the next phone call.

So how do you protect yourself?

Page 14: Social Engineering Networks Reid Chapman Ciaran Hannigan

Protecting Against These Attacks

As you know these attacks can take two different approaches; Physical and Psychological

The physical aspect; the workplace, over the phone, dumpster diving, and on-line.

The psychological aspect; persuasion, impersonation, ingratiation, conformity, and good ol’ fashion friendliness

Page 15: Social Engineering Networks Reid Chapman Ciaran Hannigan

How To Defend Against the Physical

Check and Verify all personnel entering the establishment.

More important files should be locked up. Shred all important papers before disposing. Erase all magnetic media (hard drives, disks). All machines on the network should be well protected by

passwords. Lock and store dumpsters in secure areas.

Page 16: Social Engineering Networks Reid Chapman Ciaran Hannigan

Security Policies and Training!!!

Corporations make the mistake of only protecting themselves from the physical aspect leaving them almost helpless to the psychological attacks hackers commonly use.

Advantage: Alleviates responsibility of worker to make judgment call on the hacker’s request.

Policy should address aspects of access control and password changes and protection.

Locks, ID’s, and shredders are important and should be required for all employees.

Set it in Stone: Violations should be well known and well enforced.

Page 17: Social Engineering Networks Reid Chapman Ciaran Hannigan

Security Policies and Training!!!

All employees should know how to keep confidential information safe.

All new employees should attend a security orientation

All employees should attend an annual refresher course on these matters.

Also sending emails to employees concerning this matter; how to spot an attacker, methods in preventing them from falling victim, and stories of current and landmark cases on Social Engineering.

Page 18: Social Engineering Networks Reid Chapman Ciaran Hannigan

Spotting an Attack

What to look for: refusal to give contact information, rushing, name-dropping, intimidation, small mistakes, and requesting protected information.

Put yourself in their shoes. Think like a hacker.

Page 19: Social Engineering Networks Reid Chapman Ciaran Hannigan

What to do for the Average Joe

DO NOT DISCLOSE ANY PERSONAL INFORMATION UNLESS PERSON AND/OR SITE IS TRUSTED.

Don’t fall prey to all the get rich quick schemes. Update your security software regularly. Have a strong password and change it regularly.

Try not to have the same one for all your passwords.

Shred your important papers before throwing them out.