2.4 - Social Engineering Flashcards

1
Q

Effective social engineering

A
  • Constantly changing - You never know what they’ll use next
  • May involve multiple people
    – And multiple organizations
    – There are ties connecting many organizations
  • May be in person or electronic
    – Phone calls from aggressive “customers”
    – Emailed funeral notifications of a friend or associate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A
  • Social engineering with a touch of spoofing
    – Often delivered by email, text, etc.
  • Don’t be fooled - Check the URL
  • Usually there’s something not quite right
    – Spelling, fonts, graphics
  • Vishing (Voice phishing) is done over
    the phone or voicemail
    – Caller ID spoofing is common
    – Fake security checks or bank updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder surfing

A
  • You have access to important information
    – Many people want to see
    – Curiosity, industrial espionage, competitive advantage
  • This is surprisingly easy
    – Airports / Flights, hallway-facing monitors,
    or coffee shops
  • Surf from afar
    – Binoculars / Telescopes (easy in the big city)
    – Webcam monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing shoulder surfing

A
  • Control your input
    – Be aware of your surroundings
  • Use privacy filters
    – It’s amazing how well they work
  • Keep your monitor out of sight
    – Away from windows and hallways
  • Don’t sit in front of me on your flight
    – I can’t help myself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spear phishing

A
  • Targeted phishing with inside information
    – Makes the attack more believable
  • Spear phishing the CEO is “whaling”
    – Targeted phishing with the possibility of a large catch
    – The CFO (Chief Financial Officer) is commonly speared
  • These executives have direct access to the corporate
    bank account
    – The attackers would love to have those credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating and piggybacking

A
  • Tailgating uses an authorized person to gain
    unauthorized access to a building
    – The attacker does not have consent
    – Sneaks through when nobody is looking
  • Piggybacking follows the same process, but the
    authorized person is giving consent
    – Hold the door, my hands are full of donut boxes
    – Sometimes you shouldn’t be polite
  • Once inside, there’s little to stop you
    – Most security stops at the border
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Watching for tailgating

A
  • Policy for visitors - You should be able to identify
    anyone
  • One scan, one person
    – A matter of policy or mechanically required
  • Access Control Vestibule / Airlock
    – You don’t have a choice
  • Don’t be afraid to ask
    – Who are you and why are you here?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impersonation

A
  • Pretend to be someone you aren’t
    – Halloween for the fraudsters
  • Use some of those details you got from the dumpster
    – You can trust me, I’m with your help desk
  • Attack the victim as someone higher in rank
    – Office of the Vice President for Scamming
  • Throw tons of technical details around
    – Catastrophic feedback due to the
    depolarization of the differential magnetometer
  • Be a buddy
    – How about those Cubs?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dumpster diving

A
  • Mobile garbage bin
    – United States brand name “Dumpster”
    – Similar to a rubbish skip
  • Important information thrown out with the trash
    – Thanks for bagging your garbage for me!
  • Gather details that can be used for a different attack
    – Impersonate names, use phone numbers
  • Timing is important
    – Just after end of month, end of quarter
    – Based on pickup schedule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless evil twins

A
  • Looks legitimate, but actually malicious
    – The wireless version of phishing
  • Configure an access point to look like
    an existing network
    – Same (or similar) SSID and security
    settings/captive portal
  • Overpower the existing access points
    – May not require the same physical location
  • WiFi hotspots (and users) are easy to fool
    – And they’re wide open
  • You encrypt your communication, right?
    – Use HTTPS and a VPN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly