Chapter 11 - Low Tech Social Engineering, Physical Security Flashcards
ECC Defines 4 Phases of Social Engineering
Research (dumpster dive, websites, etc)
Select the victim (id frustrated employee, etc)
Develop a relationship
Exploit the relationship
ECC 5 Reasons why social engineering works
human nature (trusting)
ignorance of social engineering efforts
fear (of consequences of not complying with SE)
greed (promised gain from the SE)
sense of moral obligation
ECC 4 factors that allow social engineering to happen
insufficient training
unregulated information (or physical) access
complex organizational structure
lack of security policies
3 types of social engineering attacks
human
computer
mobile
Trash Intelligence, TRASHINT
ECC considers dumpster diving as social engineering
Impersonation
Social Engineer pretends to be someone else that the target either:
respects
fears
trusts
Authority Support
Attacker poses as a user, calls help desk and requests a password reset
Tailgating vs Piggybacking
Tailgating - attacker has fake badge and follows someone through the door
Piggybacking - attacker doesn’t have a badge, and asks someone to let them in anyway
RFID Skimming
cloning an RFID access card or credit card
Reverse Social Engineering
Attacker gets target to call them with information
3 steps of reverse Social Engineering
Advertisement
Sabotage
Support
Advertisement - attacker advertises his position as technical support of some kind
Sabotage - attacker pulls cables, performs DoS or something else to interrupt the target’s service
Support - target calls technical support and attacker “helps” by getting login credentials and gaining access
Items that may indicate a phishing email
beware unknown, unexpected, suspicious originators
beware whom the email is addressed to
Verify phone numbers
beware bad spelling/grammar
always check links
if you don’t know the sender, be cautious. If you know the sender and the message is out of context, be cautious
companies typically address you personally
if you see a phone number in the email, call it to verify it’s legitimate
professional email won’t have misspelled words
Spear Phishing
Targeted phishing against an individual or small group of individuals
Result of reconnaissance and a specially crafted email
Most successful SE attack globally. Because attacker has a small audience, it’s easier to craft an email to them
ex. you learn about a shipping and receiving clerk and craft an email to look like a bill of lading
Whaling
spear phishing against a high-level target, like a CEO
Chat or Messenger channels usage for SE
Used to find out personal information and spread malicious code and install software
IRC is one of the main ways that zombie computers are manipulated by attackers