Top Banner
Module IX Social Engineering Ethical Hacking Version 5
67
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ceh v5 module 09 social engineering

Module IX

Social Engineering

Ethical HackingVersion 5

Page 2: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module Objective

This module will familiarize you with the following:Social Engineering: An IntroductionTypes of Social EngineeringDumpster DivingShoulder surfingReverse Social EngineeringBehaviors vulnerable to attacksCountermeasures for Social engineeringPolicies and ProceduresPhishing AttacksIdentity TheftOnline ScamsCountermeasures for Identity theft

Page 3: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Module Flow

Social Engineering

Countermeasures

Types of Social Engineering

Countermeasures

Behaviors vulnerable to attacks

Identity Theft

Online Scams

Phishing Attacks

Policies and Procedures

Page 4: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

There is No Patch to Human

Stupidity

Page 5: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

What is Social Engineering?

Social Engineering is the human side of breaking into

a corporate network

Companies with authentication processes, firewalls,

virtual private networks, and network monitoring

software are still open to attacks

An employee may unwittingly give away key

information in an email or by answering questions

over the phone with someone they do not know, or

even by talking about a project with coworkers at a

local pub after hours

Page 6: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

What is Social Engineering? (cont’d)

Tactic or Trick of gaining sensitive information by exploiting basic

human nature such as:

• Trust

• Fear

• Desire to Help

Social engineers attempt to gather information such as:

• Sensitive information

• Authorization details

• Access details

Page 7: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human Weakness

People are usually the weakest

link in the security chain

A successful defense depends

on having good policies, and

educating employees to follow

them

Social Engineering is the

hardest form of attack to

defend against because it

cannot be defended with

hardware or software alone

Page 8: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

“Rebecca” and “Jessica”

Hackers use the term “Rebecca” and “Jessica” to denote social engineering attacks

Hackers commonly use these terms to social engineer victims

Rebecca and Jessica mean a person who is an easy target for social engineering, like the receptionist of a company

Example:

• “There was a Rebecca at the bank and I am going to call her to extract privileged information.”

• “I met Ms. Jessica, she was an easy target for social engineering.”

• “Do you have any Rebecca in your company?”

Page 9: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Office Workers

Despite having the best firewall, intrusion-detection and antivirus systems, technology has to offer, you are still hit with security breaches

One reason for this may be lack of motivation among your workers

Hackers can attempt social engineering attack on office workers to extract sensitive data such as:

• Security policies

• Sensitive documents

• Office network infrastructure

• Passwords

Page 10: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Types of Social Engineering

Social Engineering can be divided into two categories:• Human-based

– Gathering sensitive information by interaction

– Attacks of this category exploits trust, fear and helping nature of humans

• Computer-based– Social engineering carried out with the aid of

computers

Page 11: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering

Posing as a Legitimate End User

• Gives identity and asks for sensitive information

• “Hi! This is John, from Department X. I have forgotten my password. Can I get it?”

Posing as an Important User

• Posing as a VIP of a target company, valuable customer, etc.

• “Hi! This is Kevin, CFO Secretary. I’m working on an urgent project and lost system password. Can you help me out?”

Page 12: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering ( cont’d)

Posing as Technical Support• Calls as a technical support

staff, and requests id & passwords to retrieve data

• ‘Sir, this is Mathew, Technical support, X company. Last night we had a system crash here, and we are checking for the lost data. Can u give me your ID and Password?’

Page 13: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering ( cont’d)

Eavesdropping

• Unauthorized listening of conversations or

reading of messages

• Interception of any form such as audio,

video or written

Page 14: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering: Shoulder Surfing

Looking over your shoulder as you

enter a password

Shoulder surfing is the name given

to the procedure that identity

thieves use to find out passwords,

personal identification number,

account numbers and more

Simply, they look over your

shoulder--or even watch from a

distance using binoculars, in order

to get those pieces of information

Passwords

Hacker

Victim

Page 15: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering ( cont’d)

Dumpster Diving• Search for sensitive

information at target company’s

– Trash-bins

– Printer Trash bins

– user desk for sticky notes etc

• Collect– Phone Bills

– Contact Information

– Financial Information

– Operations related information etc

Page 16: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Dumpster Diving Example

A man behind the building is loading the company’s paper recycling bins into the back of a truck. Inside the bins are lists of employee titles and phone numbers, marketing plans and the latest company financials

This information is sufficient to launch a social engineering attack on the company

Page 17: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering ( cont’d)

In person

• Survey a target company to collect information on

– Current technologies

– Contact information, and so on

Third-party Authorization

• Refer to an important person in the organization and try to collect

data

• “Mr. George, our Finance Manager, asked that I pick up the audit

reports. Will you please provide them to me?”

Page 18: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Human-based Social Engineering ( cont’d)

Tailgating

• An unauthorized person, wearing a fake ID badge, enters a secured

area by closely following an authorized person through a door

requiring key access

• An authorized person may be unaware of having provided an

unauthorized person access to a secured area

Piggybacking

• “I forgot my ID badge at home. Please help me.”

• An authorized person provides access to an unauthorized person by

keeping the secured door open

Page 19: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Reverse Social Engineering

• This is when the hacker creates a

persona that appears to be in a

position of authority so that employees

will ask him for information, rather

than the other way around

• Reverse Social Engineering attack

involves

– Sabotage

– Marketing

– Providing Support

Human-based Social Engineering ( cont’d)

Page 20: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Computer-based Social Engineering

These can be divided

into the following

broad categories:

• Mail / IM attachments

• Pop-up Windows

• Websites /

Sweepstakes

• Spam mail

Page 21: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Computer-based Social Engineering( cont’d)

Pop-up Windows

• Windows that suddenly pop up, while surfing the Internet and ask for

users’ information,to login or sign-in

Hoaxes and chain letters

• Hoax letters are emails that issue warnings to user on new virus, Trojans or

worms that may harm user’s system.

• Chain letters are emails that offer free gifts such as money, and software

on the condition that if the user forwards the mail to said number of

persons

Page 22: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Computer-based Social Engineering( cont’d)

Instant Chat Messenger

• Gathering of personal information by chatting with a selected online

user to attempt to get information such as birth dates, maiden names

• Acquired data is later used for cracking user’s accounts

Spam email

• Email sent to many recipients without prior permission intended for

commercial purposes

• Irrelevant, unwanted and unsolicited email to collect financial

information, social security numbers, and network information

Page 23: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Computer-based Social Engineering( cont’d)

Phishing

• An illegitimate email falsely claiming to be from a legitimate site

attempts to acquire user’s personal or account information

• Lures online users with statements such as

– Verify your account

– Update your information

– Your account will be closed or suspended

• Spam filters, anti-phishing tools integrated with web browsers can be

used to protect from Phishers

Page 24: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Insider Attack

If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prep someone to pass the interview, have that person get hired, and they are in

It takes only one disgruntled person to take revenge, and your company is compromised

• 60% of attacks occur behind the firewall

• An inside attack is easy to launch

• Prevention is difficult

• The inside attacker can easily succeed

• Difficult to catch the perpetrator

Page 25: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Disgruntled Employee

Disgruntled Employee

CompanyNetwork

Company Secrets

Send the Data toCompetitors

Using Steganography

Competitor

Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing with stress or conflict, and frustrated with their job, office politics, no respect, no promotions etc.

Page 26: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Preventing Insider Threat

There is no single solution to prevent an insider threat

Some recommendations:• Separation of duties

• Rotation of duties

• Least privilege

• Controlled access

• Logging and auditing

• Legal Policies

• Archive critical data

Page 27: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Common Targets of Social Engineering

Receptionists and help desk

personnel

Technical support executives

Vendors of target

organization

System administrators and

Users

Page 28: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Factors that make Companies Vulnerable to Attacks

Insufficient security training and awareness

Several organizational units

Lack of appropriate security policies

Easy access of information e.g. e-mail Ids and

phone extension numbers of employees

Page 29: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Why is Social Engineering Effective?

Security policies are as strong as its weakest link, and

humans are the most susceptible factor

Difficult to detect social engineering attempts

There is no method to ensure the complete security

from social engineering attacks

No specific software or hardware for defending against

a social engineering attack

Page 30: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

An attacker may:

• Show inability to give valid callback number

• Make informal requests

• Claim of authority

• Show haste

• Unusually compliment or praise

• Show discomfort when questioned

• Drop the name inadvertently

• Threaten of dire consequences if information is not provided

Warning Signs of an Attack

Page 31: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Tool : Netcraft Anti-Phishing Toolbar

An anti-phishing system consisting of a toolbar and a central server

that has information about URLs provided by Toolbar community

and Netcraft

Blocks phishing websites that are recorded in Netcraft’s central server

Suspicious URLs can be reported to Netcraft by clicking Report a

Phishing Site in the toolbar menu

Shows all the attributes of each site such as host location, country,

longevity and popularity

Can be downloaded from www.netcraft.com

Page 32: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Phases in a Social Engineering Attack

Four phases of a Social Engineering Attack:

•Research on target company–Dumpster diving, websites, employees, tour company and so on

•Select Victim–Identify frustrated employees of target company

•Develop relationship–Developing relationship with selected employees

•Exploit the relationship to achieve the objective–Collect sensitive account information

–Financial information

–Current Technologies

Page 33: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Behaviors Vulnerable to Attacks

Trust

• Human nature of trust is the basis of any social engineering

attack

Ignorance

• Ignorance about social engineering and its effects among the

workforce makes the organization an easy target

Fear

• Social engineers might threaten severe losses in case of non-

compliance with their request

Page 34: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Behaviors Vulnerable to Attacks ( cont’d)

Greed

• Social engineers lure the targets to divulge

information by promising something for

nothing

Moral duty

• Targets are asked for the help, and they

comply out of a sense of moral obligation

Page 35: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Impact on the Organization

Economic losses

Damage of goodwill

Loss of privacy

Dangers of terrorism

Lawsuits and arbitrations

Temporary or permanent closure

Page 36: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Training

• An efficient training program should consist of all security

policies and methods to increase awareness on social

engineering

Countermeasures

Page 37: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Countermeasures (cont’d)

Password policies

• Periodic password change

• Avoiding guessable passwords

• Account blocking after failed attempts

• Length and complexity of passwords

– Minimum number of characters, use of special characters and numbers etc.

e.g. ar1f23#$g

• Secrecy of passwords

– Do not reveal if asked, or write on anything to remember them

Page 38: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Operational guidelines

• Ensure security of sensitive information

and authorized use of resources

Physical security policies

• Identification of employees e.g. issuing of

ID cards, uniforms and so on

• Escorting the visitors

• Access area restrictions

• Proper shredding of useless documents

• Employing security personnel

Countermeasures (cont’d)

Page 39: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Countermeasures (cont’d)

Classification of Information

• Categorize the information as top secret, proprietary, for internal use

only, for public use, and so on

Access privileges

• Administrator, user and guest accounts with proper authorization

Background check of employees and proper termination process

• Insiders with a criminal background and terminated employees are

easy targets for procuring information

Proper incidence response system

• There should be proper guidelines for reacting in case of a social

engineering attempt

Page 40: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Policies and Procedures

Policy is the most critical component to any information

security program

Good policies and procedures are ineffective if they are

not taught, and reinforced by the employees

Employees need to emphasize their importance. After

receiving training, the employee should sign a

statement acknowledging that they understand the

policies

Page 41: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Security Policies - Checklist

Account setupPassword change policyHelp desk proceduresAccess privilegesViolationsEmployee identificationPrivacy policyPaper documentsModemsPhysical access restrictionsVirus control

Page 42: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Summary

Social Engineering is the human-side of breaking into a corporate network

Social Engineering involves acquiring sensitive information or inappropriate access privileges by an outsider

Human-based social engineering refers to person-to-person interaction to retrieve the desired information

Computer-based social engineering refers to having computer software that attempts to retrieve the desired information

A successful defense depends on having good policies and their diligent implementation

Page 43: Ceh v5 module 09 social engineering

Phishing Attacks and

Identity Theft

Page 44: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

What is Phishing?

A form of identity theft in which a scammer

uses an authentic-looking e-mail to trick

recipients into giving out sensitive personal

information, such as, a credit card, bank

account or Social Security number

Phishing attacks use both social

engineering and technical subterfuge to

steal consumer’s personal identity data,

and financial account credentials

(adapted from “fishing for information”)

Page 45: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Attacks

Phishing is the most common corporate identity

theft scam today

It usually involves an e-mail message asking

consumers to update their personal information

with a link to a spoofed website

To give their schemes a legitimate look and feel,

fraudsters commonly steal well-known corporate

identities, product names, and logos

It is easy to construct authentic websites for e-

mail scams

Page 46: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Hidden Frames

Frames provide a popular method of hiding attack content

They have uniform browser support and an easy coding style

The attacker defines HTML code by using two frames

The first frame contains the legitimate site URL information, while

the second frame, occupying 0% of the browser interface, has a

malicious code running

Page 47: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Hidden Frames Example

<html><head><title>Frame Based Exploit Example</title></head>

<body topmargin="0" leftmargin="0" rightmargin="0" bottommargin="0"><iframe src="http://www.yahoo.com" width="100%" height="150" frameborder="0"></iframe><iframe src="http://www.msn.com" width="100%" height="350" frameborder="0"></iframe></body>

</html>

Page 48: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

URL Obfuscation

Using Strings - Uses a credible sounding text string within the URL

• Example: http://XX.XX.78.45/ebay/account_update/now.asp

Using @ sign - This kind of syntax is normally used for websites that require some authentication. The left side of @ sign is ignored and the domain name or IP address on the right side of the @ sign is treated as the legitimate domain (@ can be replaced with %40 unicode)

• Example: http://www.citybank.com/[email protected]/usb/process.asp

Status Bar Tricks- The URL is so long that it can not be completely displayed in the status bar - Often combined with the @ so that the fraudulent URL is at the end and not displayed

• Example http://www.visa.com:UserSession=2f6q9uuu88312264trzzz55884495&usersoption=SecurityUpdate&[email protected]/verified_by_visa.html

Page 49: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

URL Obfuscation ( cont’d)

Similar Name Tricks- These kinds of tricks use a credible sounding, but fraudulent, domain name

Examples:

• http://www.ebay-support.com/verify

• http://www.citybank-secure.com/login

• http://www.suntrustbank.com

• http://www.amex-corp.com

• http://www.fedex-security.com

Page 50: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

URL Encoding Techniques

URLs are Encoded to disguise its true value using hex, dword, oroctal encoding

Sometimes @ is used in the disguise

Sometimes @ sign is replaced with %40

Example:http://www.paypal.com@%32%32%30%2E%36%38%2E%32%31%34%2E%32%31%33

• which translates into 220.68.214.213

http://www.paypal.com%40570754567

• which translates into 34.5.6.7

Page 51: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

IP Address to Base 10 Formula

To convert 66.46.55.116 to base 10 the formula is:

66 x (256)3 + 46 x (256)2 + 55 x (256)1 + 116 = 1110325108

After conversion test it by pinging 1110325108 in command prompt

Exercise: Convert your classroom gateway IP address to base 10

Page 52: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Karen’s URL Discombobulator

It can determine the IP Address(es) associated with any valid domain name

It can also form URLs referencing that computer, using several URL-encoding techniques

Source courtesy http://www.karenware.com/powertools/ptlookup.asp

Page 53: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

HTML Image Mapping Techniques

The URL is actually a part of an image, which uses map coordinates to define the click area and the real URL, with the fake URL from the <A> tag is also displayed

Example:<html><head><title>CEH Demo</title></head><body><img src="file:///C:/SOMEIMAGE.jpg" width=“440" height=“356" border="0" usemap="#Map"><map name="Map"><area shape="rect" coords="146,50,300,84" href="http://certifiedhacker.com"></map></body></html>

Page 54: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Fake Browser Address Bars

This is a fake address bar

Page 55: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Fake Toolbars

This is a fake toolbar

Page 56: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

DNS Cache Poisoning Attack

This type of attack is based on a simple convention of IP address to host resolution

Here is how it works:

Every system has a host file in its systems directory. In the case of Windows, this file resides at the following location: C:\WINDOWS\system32\drivers\etc

This file can be used to hard code domain name translations

Page 57: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

How do you steal Identity?

Page 58: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

How to Steal Identity?

Original identity – Steven CharlesAddress: San Diego CA 92130

Page 59: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

STEP 1

Get hold of Steven’s telephone bill, water bill, or electricity bill using dumpster diving, stolen email, or onsite stealing

Page 60: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

STEP 2

Go to the Driving License Authority

Tell them you lost your driver’s license

They will ask you for proof of identity

like a water bill, and electricity bill

Show them the stolen bills

Tell them you have moved from the

original address

The department employee will ask you

to complete 2 forms – 1 for

replacement of the driver’s license and

the 2nd for a change in address

You will need a photo for the driver’s

license

Page 61: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

STEP 3

Your replacement driver’s license will be issued to your new home address

Now you are ready to have some serious fun

Page 62: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Comparison

Original

Identity Theft

Same name: Steven Charles

Page 63: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Go to a bank in which the original Steven Charles has an account (Example Citibank)

Tell them you would like to apply for a new credit card

Tell them you don’t remember the account number, and ask them to look it up using Steven’s name and address

The bank will ask for your ID: Show them your driver’s license as ID

ID is accepted. Your credit card is issued and ready for use

Let’s go shopping

STEP 4

Page 64: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Fake Steven has a New Credit Card

The fake Steven visits Wal-Mart and purchases a 42”plasma TV and state-of-the-art Bose speakersThe fake Steven buys a Vertu Gold Phone worth USD 20K

Page 65: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Identity Theft - Serious Problem

Identity theft is a serious problem

The number of violations has continued to increase

Securing personal information in the workplace and at home, and looking over credit card reports are just a few of the ways to minimize the risk of identity theft

Page 66: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

“Nigerian” Scam

The scam started with a bulk email or bulk faxing of a number of identical letters to businessmen, professionals, and other people who tend to have greater-than-average wealth

The Nigerian scammers tried to make their potential victims think that they were going to scam the Nigerian Government, the Central Bank of Nigeria, and so on when, in fact, they were going to scam the recipients of the letters. The plan was to charge them to get in on the scam, or the portion of the scam for which they were willing to pay to make it work

Page 67: Ceh v5 module 09 social engineering

EC-CouncilCopyright © by EC-Council

All Rights reserved. Reproduction is strictly prohibited

Countermeasures

Be suspicious of any email with urgent requests for personal financial information

Do not use the links in an email to get to any web page, if you suspect the message might not be authentic

Call the company on the telephone, or log onto the website directly by typing in the Web address into your browser

Avoid filling out forms in an email that asks for personal financial information

Always ensure that you are using a secure website when submitting credit card or other sensitive information via a web browser