Top Banner
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful Awareness Program
36

Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful Awareness Program

Jan 21, 2018

Download

Technology

EC-Council
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Phishing: It’s Not Just for PentestersUsing Phishing to Build a Successful Awareness Program

Page 2: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Intro

www.hackerhalted.com 2

• Enterprise Security Consultant at Sword & Shield Enterprise Security• 2017 DerbyCon Social Engineering Capture the Flag (SECTF) winner• Served in the US Navy, Navigating Submarines• Holds the CISSP-ISSMP, GSNA, and GCIH certifications• Frequent Guest Blogger

• AlienVault• Tripwire• ITSP Magazine• Sword & Shield’s Blog

• Maintains blog and podcast at https://advancedpersistentsecurity.net• Trains (spoken taps out a lot) in Brazilian Jiu Jitsu

Page 3: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

www.hackerhalted.com 3

Page 4: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Goals

www.hackerhalted.com 4

• Open Source Intelligence (OSINT)

• Social Engineering• Pretexting• *ishing (Spear phishing, Vishing, and Smishing)• Whaling• Baiting• Dumpster Diving

• Applied Social Engineering

• OSINT in enabling more effective social engineering

• Tools and Techniques for collecting OSINT

• OSINT and Social Engineering integration

• Mitigations of Social Engineering

• Training of Teams

Page 5: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

What is Social Engineering?

www.hackerhalted.com 5

• Human Hacking

• Exploits the human factor and often bypasses technology and expensive equipment

Page 6: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Pioneers of the Art

www.hackerhalted.com 6

Page 7: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

www.hackerhalted.com 7

Page 8: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Examples of Social Engineering

www.hackerhalted.com 8

• Phishing

• Spear Phishing

• Whaling

• Vishing

• Smishing

• Baiting

• Pretexting

• Dumpster Diving

• Tailgating

Page 9: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Psychology of Social Engineering

www.hackerhalted.com 9

• Everything goes back to Dr. Cialdini’s 6 Principles of Persuasion1. Reciprocity

2. Commitment and Consistency

3. Social Proof

4. Liking (Likability)

5. Authority

6. Scarcity (Urgency)

Page 10: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Applicationof Social Engineering

www.hackerhalted.com 10

• Social Engineering aims to influence the users to:• Provide some sort of data (ideally, sensitive data)

• Tell us something that is not online and readily available

• Tell us who could do something or tell us more (give us better targets)

• Tell us about the operating environment and issues within

• Perform an action• Clicking a link

• Making a change to the firewall rules

• Open an email

Page 11: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

What is OSINT?

www.hackerhalted.com 11

OSINT is drawn from publicly available material, including:

• The Internet

• Traditional mass media (e.g. television, radio, newspapers, magazines)

• Specialized journals, conference proceedings, and think tank studies

• Photos

• Geospatial information (e.g. maps and commercial imagery products)

Page 12: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Where can one gather OSINT?

www.hackerhalted.com 12

Page 13: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Gathering OSINT

www.hackerhalted.com 13

• Public conversations (borderline HUMINT)• Bars• Malls• Restaurants

• Family and Friends

• Back Windshields

• Mostly, the internet• Forums• Job Boards• Search Engines• Social Media

Page 14: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Goals of OSINT

www.hackerhalted.com 14

Page 15: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

An example of OSINT

www.hackerhalted.com 15

Page 16: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Another Example

www.hackerhalted.com 16

Page 17: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

…another…

www.hackerhalted.com 17

Page 18: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

…last one…

www.hackerhalted.com 18

Page 19: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

OSINT Demo

www.hackerhalted.com 19

Page 20: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Timing

www.hackerhalted.com 20

Page 21: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

SE and OSINT Relationship

www.hackerhalted.com 21

• They share similar properties in terms of human psychology

• OSINT can be used to build a dossier or profile about a SE target• This can provide context for the contact

• Better pretexting

• Better (spear) phishing

• Better “other” technical stuff like password guess (or even passwords)

Page 22: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Attribution?

www.hackerhalted.com 22

Page 23: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Law Enforcement

www.hackerhalted.com 23

Page 24: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Sales and Retail

www.hackerhalted.com 24

Page 25: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

…more examples…

www.hackerhalted.com 25

Page 26: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

…even more…

www.hackerhalted.com 26

Page 27: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Is this one and done?

• Several rounds may be required.

• You may find something interesting towards the end that causes you to look at everything again from a different angle.

www.hackerhalted.com 27

Page 28: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Collection Considerations

• What is the Endgame?

• Is what you’re doing ethical? • Do you have an ethical obligation to do this a certain way?

• Is this legal?• Does the state that I am doing this in require Private

Investigator Licensure?

• I have collected all this data, how do I protect it?• How long do I retain it?• How do I dispose of it?• What value could be assigned to it?

www.hackerhalted.com 28

Page 29: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Weaponizing OSINT

• We can’t be like the South Park underpants gnomes…

www.hackerhalted.com 29

Page 30: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Social Engineering Demo

www.hackerhalted.com 30

Page 31: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Contact Me

Social Media

• Twitter: @C_3PJoe / @advpersistsec

• LinkedIn: linkedin.com/in/billyjgrayjr

• Facebook: facebook.com/joegrayinfosec

Email

[email protected]

[email protected]

Blog and Podcast

• advancedpersistentsecurity.net

Podcast is also on iTunes, Stitcher, Google Play, and other fine platformswww.hackerhalted.com 31

Page 32: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Future Speaking Engagements

October 17-18: EDGE Security Conference, Knoxville, TN

October 20-22: SkyDogCon, Nashville, TN

October 26-17: Lone Star Application Security Conference

(LASCON), Austin, TX

November 11: Bsides Charleston, Charleston, SC

November 15: Metro Atlanta ISSA Conference, Atlanta, GA

www.hackerhalted.com 32

Page 33: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Contacting Sword & Shield

www.hackerhalted.com 33

Page 34: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

Questions?

www.hackerhalted.com 34

Page 35: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

OSINT Resources35

(All in no particular order; except the book section)

• Blogs:• Automatingosint.com• learnallthethings.net• Osint.fail

• Podcasts:• Complete and Privacy Security Podcast• Social Engineer Podcast

• Book:• Open Source Intelligence Techniques (Michael Bazzell)

• Slack:• Openosint.slack.com• Aps-opensource.signup.team

Page 36: Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful Awareness Program

OSINT Resources36

(All in no particular order; except the book section)

• People to Follow:• @beast_fighter• @baywolf88• @jms_dot_py• @jnordine• @upgoingstar• @_sn0ww• @sarahjamielewis• @webbreacher• @andrewsmhay• @dutch_osintguy• @infosecsherpa• @sweet_grrl• @inteltechniques• @cybersecstu• @jennyradcliffe• @ginsberg5150• @iv_Machiavelli• @GRC_Ninja