Top Banner
Topic 8: some examples and stories 2018 Kaido Kikkas. This document is dual-licensed under the GNU Free Documentation License (v l.2 or newer) and the Creative Commons Attribution-ShareAlike (BY-SA) 3.0 Estonia or newer license Social Engineering (II909) Kaido Kikkas
16

Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Jun 03, 2019

Download

Documents

lamdan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Topic 8: some examples and stories

2018 Kaido Kikkas. This document is dual-licensed under the GNU Free Documentation License (v l.2 or newer) and the Creative Commons Attribution-ShareAlike (BY-SA) 3.0 Estonia or newer license

Social Engineering (II909)

Kaido Kikkas

Page 2: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Examples

● The stories come from various sources, ranging from the beginning (sort of) to today (pictures come from Wikimedia Commons)

● Revisiting some topic 1 material too, with some additional depth gathered from subsequent topics

● In all cases, SE relies of people being too– clueless– nice

Page 3: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

It all started in the Garden of Eden● Social engineers are from Hell (apparently) –

the first of them being the Devil himself, deceiving Adam

● Methods used:● Pretexting/masquerading (serpent)● Persuasion (“You will not die”)● Baiting (“You will get to know good and evil, just like

God”)● Woman-in-the-Middle attack (Eve)

https://en.wikipedia.org/wiki/Fall_of_man#/media/File:Michelangelo_S%C3%BCndenfall.jpg

Page 4: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Beware of the Greeks bearing gifts

● The original Trojan Horse (supposedly conceived by Ulysses)

● Methods:● Baiting● Persuasion (Sinon “left behind”)● Ignorance/disbelief (Cassandra)● Assassination (Laocoön killed after

trying to warn Trojans)● Escalation (30-50 men let the army

in)https://en.wikipedia.org/wiki/Trojan_Horse#/media/File:Replica_of_Trojan_Horse_-_Canakkale_Waterfront_-_Dardanelles_-_Turkey_(5747677790).jpg

Page 5: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

The promised land in Nowhere

● Gregor MacGregor of Scotland● Fought in Latin America early

18th c.● The Poyais scheme 1821-37● Convinced 250 people to move to

a fictional colony in Venezuela, half of them died; many others lost their ‘investments’

● Was welcomed as a hero back in Venezuela in 1838, after death in 1845 received full military burial

https://en.wikipedia.org/wiki/Gregor_MacGregor#/media/File:General_Gregor_MacGregor_retouched.jpg

Page 6: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

A lot of scrap metal in Paris

● Victor Lustig 1925● Sold Eiffel Tower to scrap.

Twice.● Second take backfired, was

forced to flee to the U.S.● Method: brilliant use of an

actual long-time controversy● Ended up in Alcatraz, died in

1947● “Apprentice salesman” listed

as occupation on death certificate

https://en.wikipedia.org/wiki/Victor_Lustig#/media/File:Victor_Lustig.jpg

Page 7: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Lustig’s Commandments● Be a patient listener (it is this, not fast talking, that gets a con man

his coups)

● Never look bored

● Wait for the other person to reveal any political opinions, then agree with them

● Let the other person reveal religious views, then have the same ones

● Hint at sex talk, but don't follow it up unless the other person shows a strong interest

● Never discuss illness, unless some special concern is shown

● Never pry into a person's personal circumstances (they'll tell you all eventually)

● Never boast - just let your importance be quietly obvious

● Never be untidy

● Never get drunk

Page 8: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Collect some toll in NYC

● Charles C. Parker● “And if you believe that, I have a

bridge to sell you”● Sold various NY landmarks to

immigrants, including the Brooklyn bridge (“start collecting toll”)

● Methods: persuasion, pretexting, document forgery

● Died in Sing Sing in 1936

https://en.wikipedia.org/wiki/George_C._Parker#/media/File:Parker_02.png

Page 9: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

The Pyramid

● Carlo (Charles) Ponzi 1920● Postal coupon business financed

by expansion (the pyramid or Ponzi scheme)

● Collapse cost: ~20 MUSD● Died as a poor man in Brazil in

1949

https://en.wikipedia.org/wiki/Charles_Ponzi#/media/File:Ponzi1920.jpg

Page 10: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Kevin

● THE social engineer● Greater LA bus hack at school● Looped background ad tape to get into Pacific

Telephone● Donuts left for FBI (after an early warning alarm

started to work)● Employed by Holme, Roberts & Owen law firm

in Denver as Erik Weisz● … (seek and read by yourself)

Page 11: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Three blind mice

● Muzher, Shadde and Munther (Ramy) Badir, three Israeli Arab brothers born blind

● Extensive phreaking and social engineering spree in the 90s

● 44 charges in 1999, ~2M USD● No legislation in Israel that time● Ramy got 47 month, Muzher 6

months of community service

https://www.wired.com/wp-content/uploads/archive/wired/archive/12.02/images/FF_84_phreaks_1.jpg

Page 12: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Viva Las Vegas

● Alex Mayfield and his friends, 1990s (as described by Mitnick’s The Art of Intrusion)

● Reverse-engineered the ROM of gambling machines and managed to swap it in

● Two interesting steps:● Part of the object code was listed in the related patent

application (in a Washington DC library)● Managed to purchase a similar Japanese design in Vegas,

engineered the limitations)

Page 13: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

The three (back)doors

● Back Orifice, Sub7 and NetBus (around the turn of the century)

● Classic trojan horses, no self-propagation – spread by social engineering only

● The case in Sweden

Page 14: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Scambaiting

● a.k.a. mugu-baiting, turning the table on (mostly African) scammers

● Some really hilarious stories, e.g. http://scamorama.com/smurf.html

● Morally ambiguous – scamming a scammer is still a scam, OTOH wasting his efforts is essentially good

Page 15: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

Conclusion

● The main point to learn from stories – people are good, lazy and try to avoid conflicts

● In the land of the blind, the one-eyed man is king. So is a half-compentent person in the land of ignorants…

● SE is a dark art – it destroys faith in people :)

Page 16: Social Engineering (II909) Kaido Kikkasakadeemia.kakupesa.net/arhiiv/SE2018S/lectures/lecture8.pdfExamples The stories come from various sources, ranging from the beginning (sort of)

For further reading

● The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein

● The Art of Deception, The Art of Intrusion and Ghost in the Wires by Kevin Mitnick (also The Art of Invisibility, but it is not about SE)

● Scamorama.com, 419eater.com, whatsthebloodypoint.com