Social Engineering: The Art of Manipulation Organized by Jeremy Smith, Freshman at Indiana University of Pennsylvania
Roadmap What is social engineering? The physical techniques/methods Psychological methods Methods to avoid it
What is Social Engineering? The act of manipulation by one person to another to accomplish goals that may or may not be in the “target’s” best interest. “The art and science of getting people to comply to your wishes”
“Phishing” for the goods Fraudulently obtaining private information Usually by sending a false e-mail containing attachments.
Pretexting The person often uses impersonations. Using an invented scenario to engage a victim in a way that increases the chance of him/her giving information. The person often uses impersonations. Assume the character of another person
Methods and Techniques Dumpster Diving “trashing” Company phone books, memos, calendars of events & vacations, disks & tapes etc.
Social engineering by phone The most prevalent type of social engineering Once again, the hacker will imitate a person of authority and gradually get information from the target. E.g. AT&T, Verizon, Banks Help desk employees are vulnerable “They are trained to be friendly”
The “REAL” hackers are online How many passwords do you use? “catch one catch all” Usually by sending an e-mail that appears to come from a legitimate business, bank or other company requesting “verification”.
Psychological Techniques Impersonations A repairman, IT support, trusted third party, or a fellow employee Conformity If the hacker acts as a manager or authority figure Alleviates stress on the employee When in doubt, they will simply be nice. “The Science of Behavior and Mental Processes”
Conclusion: What to look out for Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. DO NOT reveal personal or financial information out via e-mail. Pay attention to the URL Small differences like their domain name Shred papers before putting them into the dumpster Do ID checks whether it’s done over the phone or in person Make employees aware of impersonation technique
Sources http://www.social-engineer.org/ http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics Ask.com for images