Top Banner
The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary
12

The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Dec 24, 2015

Download

Documents

Stewart Wheeler
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

The Human FirewallMaintaining Your Guise As A Social Engineer

Tim Roberts / Brent WhiteOffensive Security Consulting Services -

Solutionary

Page 2: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

• What to do as a Penetration Tester• Moving beyond “Intuition Alarms”

• Rebuttals to being “caught”.

• Client: Security Awareness• Knowing our methods to strengthen your Security Awareness

Program

Objectives…

Page 3: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Hacker: “Just to validate, I need you to confirm your password.”

Target: “I’m sorry, I cannot give that to you over the phone…Who did you say this is?”

from: Tom Hacker <[email protected]>[email protected]: “Umm…who is Tom Hacker? I don’t see him in Global.”

Dilemma… “Experience has shown, and a true philosophy will always show, that a vast, perhaps the larger portion of the truth arises from the seemingly irrelevant.”

– Edgar Allen Poe

Page 4: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Hacker: “Just to validate, I need you to confirm your password.”

Target: “I’m sorry, I cannot give that to you over the phone…Who did you say this is?”

Example Situational Responses:

Answer Approach“This is Kevin James from Help Desk.” Note: Kevin James should be a real employee of whom you are impersonating.

Diversion Approach“And that is the answer we were looking for. Good job!”

• Note: In the case of a Cold Call, you should consider ending on this note and wrapping up the conversation.

Dilemma Responses

Page 5: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

The ability to “roll with the punches” helps to avoid backing yourself up into a corner. Often times we will want to avoid the question all together or come back with one of the following:

“Answer”: Use diplomacy.

“Block”: Stop the conversation.

“Counter”: Answer a question with a question.

“Diversion”: Hey, look over there…

Skills and Traits: Improv

Page 6: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Remote Guise

• Employee• Hostname• Name, Department (HR, IT,

Security etc.) , Signature Block• Phone Number

• Auditor / Assessor• External (NIST etc.)• Internal (Corporate)

Page 7: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Physical Guise

• Employee• Name, Department, Dress Code, Supervisor

(Name drops)

• Vendor• Legit: Look at Vendor Log• “Wondering Salesman”• Physical Security Contractor• Maintenance• Lawn Care• Cleaning Crew

Page 8: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Fake Badges and Pigs

Proximity badge cloning is possible and publicly available.

As simple as:• Using a blank HID Proximity badge• Adhesive printer paper• Photoshop skills.• Local print company

Why have a fake badge?

• Less likely that an employee or a security guard is going to stop you, if they see a badge.

• How often do employees actually pay attention to the response of the badge reader?• Red/green light and “Error” tone

Page 9: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Identifying Attackers: Pig Hunting

How to identify piggybacking:• Suspicious Activity

• Hanging around the door (waiting)• Following close • Inconvenienced by inquiries• High sense of urgency• No badge

Page 10: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Identifying Attackers: Badges

How to identify fake badges:• Flipped over • Covered badge

(card, family photo etc)• Photo inconsistency• Does it work?

How to prevent cloned badges:• Where is your badge?• Why is this guy rubbing up against me?• Who is that carrying a weight scale around

with them?• Don’t always go cheap.

Page 11: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

Be Skeptical

Calmly and patiently listen to what others have to say, and recognizing when they’re feeding you garbage.

Page 12: The Human Firewall Maintaining Your Guise As A Social Engineer Tim Roberts / Brent White Offensive Security Consulting Services - Solutionary Tim Roberts.

“It’s not what you give. It’s how you give it.” – Bruce Lee

www.solutionary.com // @ZanshinH4x | @brentwdesign | www.wehackpeople.com