1 / 39

social engineering the dark art

social engineering the dark art. social engineering defined. b eyond the d ictionary. social engineering defined. beyond the dictionary. social engineering is…

monifa
Download Presentation

social engineering the dark art

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. social engineeringthe dark art

  2. social engineering defined beyond the dictionary

  3. social engineering defined beyond the dictionary social engineering is… an attack on the trust relationships and processes of an organization designed to grant unauthorized privilege or access to the attacker.

  4. social engineering defined beyond the dictionary social engineering is… an attack on the human firewall.

  5. social engineering defined beyond the dictionary social engineers use… small pieces of information, repeated attacks, multiple techniques, technology for assistance and good social skills to break in.

  6. methodology lather, rinse, repeat

  7. methodology lather, rinse, repeat

  8. reconnaissance reach out and fist someone dial for dollars interactive recon

  9. reconnaissance executive vainglory

  10. reconnaissance tom is your fiend weakest link in the chain site:linkedin.com -dir inurl:pub “company" site:facebook.com “company" site:facebook.com “person" monster bait site:monstercom “company"

  11. reconnaissance I am from the government and I’m here to help http://www.fec.gov/finance/disclosure/advindsea.shtml

  12. reconnaissance with vendors like these…

  13. reconnaissance my other google is maltego

  14. the art of disguise incognito is not a ludacris album

  15. the art of disguise the invisible man janitors maintenance people delivery personnel contractor

  16. the art of disguise all for one and one for fail it guy corporate lackey “new guy” Your Logo

  17. the art of disguise props and toys that don’t ship in a brown wrapper computer gear id badge work order clipboard portable media

  18. the art of disguise on the internet nobody knows you’re a god pretext calling spear phishing social networks

  19. the art of disguise sufficiently advanced technology is indistinguishable from magic email caller id rfid

  20. getting what you want sycophants make great minions • appeal to authority appeal to authority

  21. getting what you want cute puppy-dog eyes • appeal to authority • plea for help plea for help

  22. getting what you want white knight security • appeal to authority • plea for help • offer of help offer of help

  23. getting what you want friends don’t let friends get social engineered • appeal to authority • plea for help • offer of help • developing rapport developing rapport

  24. getting what you want let someone else create the sycophant for you • appeal to authority • plea for help • offer of help • developing rapport • name dropping name dropping

  25. getting what you want where there’s a will there’s a way • appeal to authority • plea for help • offer of help • developing rapport • name dropping etcetera

  26. typical scenario what does an attack look like? corporate headquarters, this is judyavalon. how may i direct your call.

  27. typical scenario what does an attack look like? hello, this is natehanson from iron mountain. i was trying to get in touch with the it manager.

  28. Typical Scenario What Does an Attack Look Like? Certainly, Mr. Hanson. I’ll transfer you now. Thank you.

  29. Typical Scenario What Does an Attack Look Like? You have reached the voicemail of Ted Simmons…. <CLICK>

  30. typical scenario what does an attack look like? sunnyvale branch, melanie brooks speaking. melanie, this is natehanson from the it department. my boss, ted simmons asked me to call to find out if your location is having problems yet.

  31. typical scenario what does an attack look like? no…. that “yet” sounds bad. yes, ma’am, we think judyavalon’s computer started it. i need you to run some commands for me so your branch won’t be affected.

  32. typical scenario what does an attack look like? secret virus

  33. typical scenario what does an attack look like? ok, now what? that’s it, melanie. you saved your branch. thanks a lot!

  34. typical scenario what does an attack look like? <printer noises> social engineering strikes again!

  35. tha art of storytellin’ your turn

More Related