social engineering
play

Social Engineering Techniques, Methods, Tools & Mitigation - PowerPoint PPT Presentation

Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant Agenda Social Engineering Methodology Attacks & Techniques Demos Tools of the trade Prevention Methods and Advice


  1. Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

  2. Agenda • Social Engineering Methodology • Attacks & Techniques • Demos • Tools of the trade • Prevention Methods and Advice

  3. What is Social Engineering?

  4. Invest in Products…

  5. Is Our Security Focus Wrong?

  6. Why Security Fail???

  7. Who Are The Threat Actors? • Aggrieved ex-employees • Internal Employees • Activists • Corporate Espionage • Blackhat Hackers

  8. Who Are The Targets?

  9. It Only Needs One…

  10. Social Engineering Methodology

  11. Social Engineering - Recon Digital • Search Engines • Email Harvesting • DNS Records • Social Medial • Metadata • Public Records Physical • Physical Walk • Dumpster Diving • Tailgate Employees to Lunch Breaks

  12. Social Engineering - Breach • Obtain Domain Credentials via Phishing Attacks • Obtain Network Level Access via Spear Phishing Attacks • Bypass Physical Security Defences and Obtain Corporate Documents

  13. Attack Vectors • Physical • Phishing • Telephone • Shoulder Surfing • Tailgating

  14. Social Engineering Tactics • Impersonation (Spoofed Emails, Telephone Attacks, Scenario-based attacks) • Urgency • Obligation • Authority • Flattering • Fear

  15. Do you recognize the signs?

  16. Do you recognize the signs?

  17. Do you recognize the signs?

  18. NCC Test Case

  19. Why This Attack Was Successful? 1. Trusted Source // IT Helpdesk 2. Promotes Fear // Accounts will be disabled Lesson Learned? Always Validate the Origin of the Information!!!

  20. Tools of The Trade • SET • TheHarvester • Recon-NG • Phishing Frenzy • PwnPlug Devices

  21. Physical to Cyber is Just One Port A way….

  22. Do You See These Stuff Often Internally?

  23. Mitigations • Limit Online Exposure • Email and Web Gateway Solutions (URL Sandboxing etc.) • Anti-tailgating Barriers • Social Engineering Assessments • Increase User Awareness via Trainings • Policies (Escort visitors etc.)

  24. Conclusion • False Sense of Security (PCI DSS, Products etc.) • Management People are Reactive NOT Proactive • Strong Physical && Weak Human == Pwned • Employees Must Feel Safe to Click Any Link Inside Their Company Environment!!!

  25. Any Questions???

  26. Website: trustforum.nccgroup.com Twitter: @NCCTrustForum Email: trustforum@nccgroup.com

  27. UK Offices North American Offices Australian Offices Manchester - Head Office San Francisco Sydney Cheltenham Atlanta Edinburgh New York Leatherhead Seattle London Thame European Offices Amsterdam - Netherlands Munich – Germany Zurich - Switzerland

Recommend


More recommend