0% found this document useful (0 votes)
99 views44 pages

11-Social Engineering Tool Kit-16!08!2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views44 pages

11-Social Engineering Tool Kit-16!08!2024

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

Social Engineering Attack

Social Engineering Attack


• It is the tactic of manipulating, influencing, or deceiving a victim to
gain control over a computer system, or to steal personal and
financial information.
• It uses psychological manipulation to trick users into making security
mistakes or giving away sensitive information.
Social Engineering Attack Life Cycle
Types of Social Engineering Attacks
1. Technology Based Attack
2. Human Based Attack
Technology Based Attack
• Baiting:
• It uses a false promise to temper a victim’s greed or curiosity.
• They lure users into a trap that steals their personal information or inflicts their
systems with malware.
• The most reviled form of baiting uses physical media to disperse malware.
• For example, attackers leave the bait typically malware-infected flash drives in
conspicuous areas where potential victims are certain to see them (e.g., bathrooms,
elevators, the parking lot of a targeted company).
• The bait has an authentic look to it, such as a label presenting it as the company’s
payroll list.
• Victims pick up the bait out of curiosity and insert it into a work or home computer,
resulting in automatic malware installation on the system.
• Baiting scams don’t necessarily have to be carried out in the physical world. Online
forms of baiting consist of enticing ads that lead to malicious sites or that encourage
users to download a malware-infected application.
• Watering hole
• Websites of governments, regulatory bodies and financial authorities are preferred targets
for "watering hole" attacks on finance, investment and compliance professionals.
• These online resources make it easy for attackers to target their victims.
• So-called watering hole (a.k.a. "water holing") attacks are probably the most economical of
online exploits.
• Instead of identifying and tracking down individual targets one-by-one, the threat actors first
research and identify a vulnerable website frequently sought out by key professionals in the
targeted industry or organization.
• In the second step, they install an exploit kit that may allow the attackers to target that site’s
users even more selectively, for instance based on their IP number. Like lions hidden in the
savannah grass, they then lay and lurk.
• Once their prey shows up at the "water hole", the victim’s locally installed browser takes
care of the rest. Because the browser is designed to indiscriminately fetch and execute code
from the web on the local machine, it will silently download the malware from the infected
site.
• This then allows the attackers to steal the visitor’s corporate network credentials and stage a
lateral attack within the victim's organization, for instance by following up with a pinpointed
phishing emails to employees reporting to the victim.
• Phishing
• The process of attempting to acquire sensitive information such as usernames,
passwords, and credit card details by masquerading as a trustworthy entity using
bulk email, SMS text messaging, or by phone.
• Phishing messages create a sense of urgency, curiosity, or fear in the recipients of
the message.
• Categories of phishing:
• Email phishing
• Spear phishing
• Whaling
• Vishing
• Smishing
Email Phishing
Spear Phishing
• Spear phishing is a malicious email spoofing attack that targets a specific
organization or individual, seeking unauthorized access to sensitive information.
• Spear phishing attempts are not typically initiated by random hackers but are
more likely to be conducted by perpetrators out for financial gain, trade secrets
or military information.
• Like emails sent in regular phishing attacks, spear phishing messages also appear
to come from a trusted source.
• Phishing messages usually appear to come from a large and well-known company
or website with a broad user base, such as Google or PayPal.
• In the case of spear phishing, however, the source of the email is likely to be an
individual within the recipient's own company, generally, someone in a position
of authority or someone the target knows personally.
Whaling
• Whale phishing is a cyberattack that specifically targets high-level
executives (CEOs and CTOs) within an organization, aiming to steal
sensitive information or authorize fraudulent financial transactions by
impersonating trust
• Whaling is a specific type of spear phishing attack. While spear
phishing can target any individual, whaling targets high-value
individuals who are more likely to have access to data or funds.
• Like spear phishing attacks, whaling attacks use tactical emails that are
personalized to convince individuals to act. Whaling attackers will not
send mass emails and may even use follow-up calls to appear more
legitimate.
Vishing Attack
Smishing Attack
• Smishing is a social engineering attack
that uses fake mobile text messages to
trick people into downloading
malware, sharing sensitive information
or sending money to cybercriminals.
The term “smishing” is a combination
of “SMS”—or “short message service,”
the technology behind text
messages—and “phishing.
2. Human Based Attack
• Shoulder surfing
• Dumpster diving
• Reverse social Engineering
Shoulder surfing

• It is a social engineering attack, where unauthorized individuals or shoulder surfers,


secretly attempt to access your private information by observing your activities or
screens over your shoulder.
• Their primary purpose is to steal sensitive data, including PINs, passwords, bank
details, and other personal information.
• They use various methods, like direct observation or the usage of devices like cameras
or binoculars, to capture this data for malicious intentions, including identity theft,
unauthorized transactions, or different fraudulent activities.
• This malicious tactic is prevalent in public places, like offices, cafes, during travel, or
at ATMs
How to prevent Shoulder Surfing?
• Be Aware of Your Surroundings
• Always be careful of your surroundings, especially in public areas.
• Choose secure spots to prevent easy observation of your screen.
• Password Security
• Use complex and strong passwords.
• Avoid common or predictable passwords.
• Consider implementing a password manager for secure password management.
• Multi-factor Authentication
• Implement Multi-factor Authentication (MFA) for an extra layer of security. It makes unauthorized
access difficult even if the password is observed.
• Avoid public Wi-Fi
• Avoid public Wi-Fi for sensitive transactions.
• Use secure connections like mobile data or a VPN, as it encrypts your data, providing an additional
layer of security.
• Biometric Authentication
• Utilize biometrics like fingerprint or facial recognition for device and application logins.
• Privacy Screens or Filters
• Use privacy screen protectors or filters to limit screen visibility. It reduces the chance of
shoulder surfers viewing your information.
• Physical Barriers
• Position your body strategically to block the view of your ATM screen or keypad from
onlookers.
• Use your body as a shield when entering passwords on your phone.
• Secure your device
• Lock screens or log out when devices are not in use.
• Report lost or stolen devices promptly.
• Disable SMS preview on the Lock Screen
• Disable SMS preview on the lock screen to protect MFA messages.
• Be Cautious of Strangers
• Be vigilant for potential distractions or individuals showing undue interest in your activities.
• Awareness and Discretion in Conversation
• Avoid discussing sensitive information in public areas.
• Be discreet during phone calls to prevent overhearing.
Dumpster
diving
Reverse Social Engineering
Example
Social Engineering counter measures
• Don't open email attachments from suspicious sources. Even if you do know the sender and the message seems
suspicious, it's best to contact that person directly to confirm the authenticity of the message.
• Use Multi-Factor Authentication (MFA). One of the most valuable pieces of information attackers seeks are user
credentials. Using MFA helps to ensure your account's protection in the event of an account compromise. Follow Computing
Services instructions for downloading DUO two-factor authentication to add another layer of protection for your Andrew
account.
• Be wary of tempting offers. If an offer seems too good to be true, it's probably because it is. Use a search engine to look up
the topic which can help you quickly determine whether you're dealing with a legitimate offer or a trap.
• Clean up your social media. Social engineers clean the Internet searching for any kind of information they can find on a
person. The more information you have posted about yourself, the more likely it is that a criminal can send you a targeted
spear phishing attack.
• Install and update antivirus and other software. Make sure automatic updates are turned on. Periodically check to make
sure that the updates have been applied and scan your system daily for possible infections. Visit Secure Your Computer on
the Computing Services website for more instructions on using and updating antivirus software.
• Back up your data regularly. If you were to fall victim to a social engineering attack in which your entire hard drive was
corrupted, it is essential that you have a backup on an external hard drive or saved in the cloud.
• Avoid plugging an unknown USB into your computer. When a USB drive is found unattended, please give it to a cluster
consultant, the Computer Services Help Center, a residence assistant (RA), or to Carnegie Mellon campus police.
• You should also Disable Autorun on your machine. Autorun is a feature that allows Windows to automatically run the
startup program when a CD, DVD, or USB device is inserted into a drive.
Social Engineering Toolkit
THE SOCIAL-ENGINEER TOOLKIT (SET)
• The Social-Engineer Toolkit (SET) was created and written by Dave
Kennedy, the founder of TrustedSec.
• It is an open-source Python-driven tool aimed at penetration testing
around Social-Engineering.
• It has been presented at large-scale conferences including Blackhat,
DerbyCon, Defcon, and ShmooCon. With over two million downloads,
it is the standard for social-engineering penetration tests and
supported heavily within the security community
• Next create a simple html file with the anchor tag.
• Href: can be ip address or the url address.
• The victim may receive this link through mail.
• When the link is clicked, he /she will be directed to the page similar to
the google page.
• Mostly the victim doesn’t look after the url.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy