social engineering
play

Social Engineering CS 334 - Computer Security Thanks to: The late - PowerPoint PPT Presentation

Social Engineering CS 334 - Computer Security Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 1 Social


  1. Social Engineering CS 334 - Computer Security Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 1

  2. Social Engineering: Definition � • Social Engineering: “the practice of obtaining confidential information by manipulation of legitimate users.” (from Wikipedia.com) • Attackers “trick” employees into revealing sensitive information, usually to gain access to a computer system: user-ID, password, IP address, etc. 2

  3. Social Engineering: Definition � • A Social Engineer is basically a flavor of “Con- Man” (“Con-Person?) • Historically, Con-Men have been highly successful at convincing victims to give them valuable items (money, jewelry, etc). • Social Engineers employ similar methods aided by modern technology to obtain valuable data from system users. 3

  4. Social Engineering: Definition � • Con-Men and social engineers see their attacks as an art form or a social trade. – The pride themselves on their ability to manipulate a person’s natural tendency to trust others – They are highly skilled and use very effective psychological methods – Some work for personal edification; other work for profit 4

  5. Social Engineering ¨ The end user is usually the weakest link of a system ¤ People are often lazy, ignorant to security, or simply gullible ¨ Social engineering is a journey into social psychology! ¤ Yes I know, that probably doesn’t sound very fun ¤ Well guess what… it is, so deal with it!

  6. But First: Some Examples 6

  7. Case Scenario: Meet Angry Cow � • Angry Cow is a Computer Science student at UW- Madison • Angry Cow just got an eviction notice! 7

  8. Simple Public Information is Found • Angry Cow lives at the Regent • The Regent’s website indicates that it is owned by Steve Brown Properties • Angry Cow wants to “fix” Steve Brown’s record keeping spreadsheet to show that rent has been paid 8

  9. Finding A Way In... • Facebook is Angry Cow’s first weapon of choice because it is an unofficial source of information • Poor controls over data sharing • Lots of important information there that might not seem important, but could be his first step in… • Go to Facebook and search: “Steve Brown Apartments” to find an appropriate unknowing accomplice 9

  10. 10

  11. Let ʼ s See -- Danielle Treu • Born July 24, 1988 • Enjoys playing in the rain, drinking coffee, and spending money • Works at Subway and as a Resident Assistant for Steve Brown Apartments 11

  12. Let ʼ s See -- David Klabanoff • Born April 21, 1979 • Likes Star Wars and The Muppet Movie • Is a Concierge for Steve Brown Apartments 12

  13. Let ʼ s See -- Andrew Baldinger (who made these slides?) • Born March 30, 1986 • Likes kayaking, exploring, and getting lost • Lives at the Regent • Works as a Technology Support Specialist for Steve Brown Apartments 13

  14. Let ʼ s Start with Danielle Treu • Her Facebook profile is pubic, but she is intelligent. She keeps her contact information private • But her profile does say that she attends UW- Madison... • I wonder if they have some more public information about her 14

  15. More Research • UW Whitepages is PUBLIC information • That conveniently provides her email address 15

  16. Primary Contact 16

  17. Establishing the Trust � • Danielle talks to David, and since David trusts Danielle as an “insider”, this trust transfers to the fake Andrew • Angry Cow shows up later that day. David is expecting him. • Angry Cow identifies himself as Andrew and asks David for key to server room 17

  18. The Hack • Angry Cow gets physical access to server, uses a standard password cracking program to get Admin username, password • Angry Cow logs into server and alters accounting files to indicate that his rent has been paid 18

  19. Summary of This Example • Search for public information about your target, using both official and unofficial sources • Build a trust ladder, Danielle trusts Andrew and David trusts Danielle, therefor David will trust Andrew -- even if “Andrew” is really Angry Cow! • Built a credible story • Based on pretexting 19

  20. Pretexting • Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. • It’s more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. 20

  21. Is This Really a Threat to Businesses? • So far, this just looks like a technique employed by angry individuals • Did you know that Hewlett Packard regularly engaged in Social Engineering? • They used the method of pretexting in order to get phone records • Watch the testimony of Patricia Dunn, former Director of HP: http:// pra-blog.blogspot.com/2006/10/ patricia-dunns-incredible- 21

  22. Pretexting Will Likely Continue � • As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many criminal situations and will likely continue to be a security problem in the future. • Pretexting is the most common form of social engineering. • Pretexting is the most common 22

  23. Example: Hacking Paris Hilton ʼ s Phone • In 2005, Paris Hilton’s phone was hacked. The contents of her T-Mobile Sidekick were posted to illmog.org, including the phone numbers of Eminem, Vin Diesel, Lindsay Lohan, and Anna Kournikova. 23

  24. The Steps... • The attackers learn of a programming glitch on the T-Mobile website. They found that a tool on the website contained a vulnerability in a tool on the site that allowed users to reset their account password. • They figure out how to reset the password of any user whose phone was a Sidekick. 24

  25. The Steps... • To get Paris Hilton’s phone number, the attackers get a caller-ID spoofer and call a T-Mobile sales store in California • The conversation goes something like this: – Attacker: “This is [whoever] from T-Mobile Headquarters in Washington. We heard you’ve been having problems with your customer account tools?” – Employee: “No, we haven’t had any problems really. Just a couple of slow downs.” – Attacker: “Yes, that is what is described here in this report. We’re going to have to look into this for a quick second.” 25

  26. The Steps... • The T-Mobile rep gave out the URL of the internal T-Mobile site used to manage customer accounts. • Also gave the username and password used by employees to login. • With Hilton’s phone number, they could use the glitch to reset her password. • This caused a text message to be sent to her phone. • The attackers then called her, using their caller-ID spoofer. 26

  27. The Steps... • Attacker: “There are some network difficulties. Have you been getting any SMS about a password reset? What were the contents of the message? • At this point, she has no idea that her password has really been changed and her account hacked • Since videos and data on the Sidekick are stored on T-Mobile’s central servers, they could download all of Hilton’s info to their own phones. • The hackers were teenagers. – Who appreciated that Hilton had nude photos saved on her Sidekick... 27

  28. Also, gratuitous Matrix sidestory � • Hackers also called Laurence Fishburne, demanding that he “GIVE US THE SHIP!” 28

  29. Now, Back to the “Theory” 29

  30. Social Psychology: Persuasion ¨ A number of variables influence the persuasion process: ¤ The Communicator (Who?) ¤ The Message (What?) ¤ The Audience (Whom?) ¤ The Channel (How?) ¨ For now, let’s focus on “The Communicator”

  31. Social Psychology: Persuasion ¨ The Communicator (Who?): ¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness

  32. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” white lab coat

  33. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” ¤ The “assistant” will give electric shocks in increasing voltages to the “test subject” they can hear via a covered window, but can not see ¤ The “test subject” is actually an actor and is not really getting shocked

  34. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” ¤ After a few shocks, “test subject” actor begins yelling in pain, banging on wall, begging for the shocks to stop ¤ “assistant” members would ask the man in the white coat what to do, upon being told to continue, 65% of “assistants” would go on to administer 450-volt shocks from the switch labeled “dangerous” n By the time the 450-volt switch is reached, the actor has already been dead silent for many minutes

  35. Social Psychology: Persuasion ¨ So what’s the moral of the story? ¤ Most people will obey the man in the white coat ¤ In social engineering, creating the aura of an authority figure allows the adversary to persuade easily, because she has established creditability!

Recommend


More recommend