Top Banner
Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant
27

Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Aug 26, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Social Engineering Techniques, Methods, Tools & Mitigation

Panagiotis Gkatziroulis, Security Consultant

Page 2: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Agenda

• Social Engineering Methodology

• Attacks & Techniques

• Demos

• Tools of the trade

• Prevention Methods and Advice

Page 3: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

What is Social Engineering?

Page 4: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Invest in Products…

Page 5: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Is Our Security Focus Wrong?

Page 6: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Why Security Fail???

Page 7: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Who Are The Threat Actors?

• Aggrieved ex-employees

• Internal Employees

• Activists

• Corporate Espionage

• Blackhat Hackers

Page 8: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Who Are The Targets?

Page 9: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

It Only Needs One…

Page 10: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Social Engineering Methodology

Page 11: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Social Engineering - Recon

Digital

• Search Engines

• Email Harvesting

• DNS Records

• Social Medial

• Metadata

• Public Records

Physical

• Physical Walk

• Dumpster Diving

• Tailgate Employees to Lunch Breaks

Page 12: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Social Engineering - Breach

•Obtain Domain Credentials via Phishing

Attacks

•Obtain Network Level Access via Spear

Phishing Attacks

•Bypass Physical Security Defences and

Obtain Corporate Documents

Page 13: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Attack Vectors

• Physical

• Phishing

• Telephone

• Shoulder Surfing

• Tailgating

Page 14: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Social Engineering Tactics

• Impersonation (Spoofed Emails, Telephone

Attacks, Scenario-based attacks)

• Urgency

• Obligation

• Authority

• Flattering

• Fear

Page 15: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Do you recognize the signs?

Page 16: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Do you recognize the signs?

Page 17: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Do you recognize the signs?

Page 18: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

NCC Test Case

Page 19: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Why This Attack Was Successful?

1. Trusted Source // IT Helpdesk

2. Promotes Fear // Accounts will be disabled

Lesson Learned?

Always Validate the Origin of the

Information!!!

Page 20: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Tools of The Trade

• SET

• TheHarvester

• Recon-NG

• Phishing Frenzy

• PwnPlug Devices

Page 21: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Physical to Cyber is Just One

Port Away….

Page 22: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Do You See These Stuff Often Internally?

Page 23: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Mitigations

• Limit Online Exposure

• Email and Web Gateway Solutions (URL Sandboxing etc.)

• Anti-tailgating Barriers

• Social Engineering Assessments

• Increase User Awareness via Trainings

• Policies (Escort visitors etc.)

Page 24: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Conclusion

• False Sense of Security (PCI DSS, Products

etc.)

• Management People are Reactive NOT

Proactive

• Strong Physical && Weak Human == Pwned

• Employees Must Feel Safe to Click Any Link

Inside Their Company Environment!!!

Page 25: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Any Questions???

Page 26: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

Website: trustforum.nccgroup.com

Twitter: @NCCTrustForum

Email: [email protected]

Page 27: Social Engineering€¦ · Social Engineering - Recon Digital •Search Engines •Email Harvesting •DNS Records •Social Medial •Metadata •Public Records Physical •Physical

UK Offices

Manchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Thame

North American Offices

San Francisco

Atlanta

New York

Seattle

Australian Offices

Sydney

European Offices

Amsterdam - Netherlands

Munich – Germany

Zurich - Switzerland