Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(1)
100% found this document useful (1 vote)
173 views
34 pages
ECSAv10 Instructor Slides Module 04
ECSA
Uploaded by
Jesus Lopez Barba
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save ECSAv10_Instructor_Slides_Module_04 For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(1)
100% found this document useful (1 vote)
173 views
34 pages
ECSAv10 Instructor Slides Module 04
ECSA
Uploaded by
Jesus Lopez Barba
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save ECSAv10_Instructor_Slides_Module_04 For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 34
Search
Fullscreen
MODULE OBJECTIVE Learn how to implement a comprehensive penetration testing methodology for assessing human behaviors against possible social engineering attacks.‘The objective of performing social engineering penetration testing isto test the strength of human factors in a security chain within the organization Social Engineering Penetration Testing ECSA Social engineering pen test is often used to raise the level of securty awareness among employees by allowing them to experience areal attack, without having an actual breach ‘The tester should demonstrate extreme care and professionalism during a social engineering pen test ‘and also when presenting the results of the test. You ‘don't want to break any laws, violate a client's privacy, o do anything that may result in an ‘embarrassing situation forthe organization ‘There are mainly three diferent ways by which you can conduct social engineering penetration testing: © Vishing © Phishing © PhysiSkills Required to Perform Social Engineering Pen Test ECSA Creativity Good interpersonal skills TC Talkative and friendly natureCommon Targets of Social Engineering Pen Test ve dae paste Vendors ofthe ‘Support executives —Do Remember: Before Social Engineering Pen Test ECSA “Be aware of local laws as some of your actions may infringe on them.”Do Remember: Before Social Engineering Pen Test (Cont'd) ECSA “Be aware of social engineering pretext agreed to in ROE.”Black Box or White Box? ECSA @ Inwhite box social engineering penetration testing, you will be provided with phone numbers, e-mail addresses, locations of the targets the client want to be tested 1G In black box social engineering penetration testing, you need to obtain this information from intelligence (OSINT) techniquesSocial Engineering Penetration Testing Steps ECSA Step 1 __Attempt Social Engineering Using Email Step2 Attempt Social Engineering Using Phishing Step __Attempt Social Engineering Using the Phone (Vishing) Step 4 Visit the Company as an Inquirer and Extract Privileged Information StepS __Visitthe Company Locality Step Attempt to Use Fake ID to Gain Access Step Attempt Piggybackng/Talgsting Step 8 __Usten to Employee Conversation in Communal Areas/ Cafeteria ‘Step ® ently “isgruntied Employees" and Engage in Conversation to Extract Sensitive Information Step 10 Attempt Eavesdropping Step 11 Tryto Shoulder Sur Uses Logging On Step 12 Attempt Media Dropping Step 13 Attempt Dumpster DivingECSA Social Engineering Penetration Testing using E-mail Attack VectorAttempt Social Engineering using Email 47° ‘a Create a web page that spoofs the company's Identity ‘@ Send an email to someone in the company to visit tto://x.x.x.x/login.asp? and ‘ask them to login again to activate the server upgrade \@ Make the email look legitimate and real (company fonts, colors, logo, etc.)Ooi: ee yee asa ee Send sweepstakes (like lottery, gifts) information to users, and ask them to provide their name, email ID, password, and address through an ‘online form | sao | == @ Another way to obtain information online is by posing as a network administrator and sending emails to users requesting them to provide a passwordExample of Social Engineering using Email (Cont'd) ECSAAttempt Social Engineering using Phishing ECSA (© Use fake websites to redirect employees to give out passwords and other sensitive information 1@ Pop-ups can be used to trick usersinto clicking hyperlinks that redirect them to fake web pages asking for personal information {@ Send an email to employees and provide a link for a fake site that looks similar to the original &y*-@ =.Launch a Phishing Campaign ECSA @ Launch a Phishing campaign on the organization using different frameworks such as Phishing Frenzy, LUCY, Social-Engineer ‘Toolkit (SET), SpeedPhish Framework (SPF), Gophish, etc. Phishing FrenzyLaunch a Phishing Campaign (Cont'd) ECSA T 7 1 1Launch a Phishing Campaign (Cont’d) ECSA Social-Engineer Toolkit (SET) SpeedPhish Framework (SPF)Launch a Phishing Campaign (Cont'd) ECSA GophishECSA Social Engineering Penetration Testing using Telephone Attack VectorAttempt Social Engineering using the Phone (Vishing) ECSA © Contact or schedule information for other employees © Actas a customer looking for sensitive information © Pose as an employee who forgot © Usernames and passwords their password © Trick employees into running ‘commands on their computer and giving you information © Pretend to be a technical support member to trick staffExample of Social Engineering using the Phone ECSA Call the company's help desk and ask for sensitive infor Cathe receptionist, engage in conversation, and extract various contact details of the company E35) Make t look realistic rehearse many times before = youcall Have backup answers for every question you throw at the target person 8) Record the conversation, reporting purposesECSA Social Engineering Penetration Testing using Physical Attack VectorVisit the Company as an Inquirer and Extract Privileged ECSA Information |@ Visit the company’s physical premises and pose ‘questions to the receptionist: © Lamanew customer, and lam interested in your products, Do you havea catalog? © would tke to meet your vice president. Do you know haw | ean contact him? {© What time do you usually pen and close? © Do you have any office other than this? © Do you have any other telephone numbers other than the one posted onthe website? @ Take a picture of the premises using @ phone © Askif you can use the restroom, ifthe company hasan internal restroom, and observe various rooms (take photos if you can) Example “Hi, 'm Sharon, I'm a sales rep out of the New York office. | know this is short notice, but / have a group of prospective clients out in the car that I've been trying for months to get to outsource their security training needs to us. They're located just a few miles away and | think that, if|can give them a quick tour of our {facilities, it should be enough to push them over the edge and get them to sign up. Oh yeah, they are particularly interested in what security precautions we've adopted. Seems someone hacked into their website a while back, which is one of the reasons they're considering our company.”Visit the Company Locality ECSA © Visit the company location to gather general information, such as number of people working in the company, names and phone numbers of the important persons from other sources such as: © Ancillary staff, such as maintenance or cleaning personnel © Neighboring shopkeepers and vendorsAttempt to Use Fake ID to Gain Access ECSA Create an ID/badges that looks authentic and see if you can enter into the office/restricted areas using the fake IdentityAttempt Piggybacking/Tailgating ECSA Try getting into an office (or restricted areas with authentic staff without having to show a valid ID. Use Piggybacking or ‘Tailgating techniquesListen to Employee Conversation in Communal ‘i ECSA Areas/ Cafeteria at Ty to listen to employee conversations in communal areas, such as cafeterias or hallways Listen for details such as the latest projects going ‘on within the company, the names of key personnel cor other useful information that could be exploited, Including disgruntled employeesIdentify “Disgruntled Employees” and Engage in ECSA Conversation to Extract Sensitive Information eet ae @ Identify the disgruntled employees by overhearing conversation in the company cafeteria ‘D)_ Befriend him/her and express similar views about the company to extract the following information Company's polices and I infrastructure Workplace address and contact information Personal information Organization's computer network details Organizations policies Organization's structure Organization's functions ‘Organization's future projects Organization's employee detailsAttempt Eavesdropping ECSA {© Try to obtain information by ‘eavesdropping on conversations that others are having in person, ‘over the phone or by video conference Look for confidential information in documents that are left in plain sightTry to Shoulder Surf Users Logging On ECSA |@ Walk or stand behind someone as they are typing and look at what's on their screen. Note any confidential information that is viewable {© Attempt to obtain someone's PIN or password as they enter it on their keyboard. If ou are not able to get close to thems they are typing, use binoculars ‘ora low-power telescope to observe them from afarAttempt Media Dropping ECSA © Drop a media somewhere conspicuous, lke parking lot or building entrance area o | You can use media like a USB flash drive a containing malicious software, when inserted 7 into the computer it will automatically run and then launch a client-side attack when opened |@ You could also pose as a potential employee and see if someone will print your resume from your USB flash driveAttempt Dumpster Diving ECSA @ Dumpster diving is looking for treasure in someone else's trash ©@ Look through trash cans and paper bins inside and outside of office buildings. Look for the following: © Phone bills © Contact information © Financial information © Operations-related information '@ Also look on employee desks and under their keyboards for sticky notes or other documents containing confidential information, including usernames and passwordsDocument the Result ECSA 1 Note down vulnerable targets (people) that you find vulnerable to social engineering attacks along with their name, contact details, department, etc.Social Engineering Countermeasures and Recommendations ECSA Png tee ceca ns Tain employees/help desk to never reveal passwords r other information by phone. Enforce policies for the font office and help desk personnel ‘Tain technical support executives and system administrators to never reveal passwords or ther information by phone ar email Implement strict badge, token or biometric authentication, employee training, nd security guards Employee training, best practices and checklists fr using passwords. Escort al guests Eveate vendors about socal engineering Lock and monitor mail room, employee training Keep phone closets, server rooms, et. locked a all times and keep updated inventory on equipment ‘Train executives to never reveal Identity, passwords or other confidential information by phone or email keep all rash in secured, monitored areas, shred important data erase magnetic media
You might also like
This Study Resource Was: Cloud Security and Virtualization Homework File
PDF
No ratings yet
This Study Resource Was: Cloud Security and Virtualization Homework File
1 page
CPENTbrochure
PDF
No ratings yet
CPENTbrochure
9 pages
CSCU Course
PDF
No ratings yet
CSCU Course
12 pages
Action Plan For The Implementation of The Cyber Security Concept of The Slovak Republic For 2015 2020 3
PDF
No ratings yet
Action Plan For The Implementation of The Cyber Security Concept of The Slovak Republic For 2015 2020 3
18 pages
Isc Chapter 2
PDF
No ratings yet
Isc Chapter 2
19 pages
Chapter 4 Computer Security
PDF
No ratings yet
Chapter 4 Computer Security
10 pages
CSE4003 Cyber-Security ETH 1 AC41
PDF
No ratings yet
CSE4003 Cyber-Security ETH 1 AC41
8 pages
Lecture 1 The Security Environment
PDF
No ratings yet
Lecture 1 The Security Environment
82 pages
Director Program Manager Security CIO in USA Resume Faisal Rana
PDF
No ratings yet
Director Program Manager Security CIO in USA Resume Faisal Rana
7 pages
Educause Security 2018
PDF
No ratings yet
Educause Security 2018
105 pages
IS18 - Implementation Guideline
PDF
100% (1)
IS18 - Implementation Guideline
36 pages
Threats To Data
PDF
No ratings yet
Threats To Data
11 pages
Cyber Security in Africa
PDF
No ratings yet
Cyber Security in Africa
5 pages
My Intern
PDF
No ratings yet
My Intern
22 pages
Report Prepared Especially For:: Razan Essa February 6, 2021
PDF
0% (1)
Report Prepared Especially For:: Razan Essa February 6, 2021
13 pages
Lab 1 - Researching Network Attacks and Security Audit Tools
PDF
No ratings yet
Lab 1 - Researching Network Attacks and Security Audit Tools
5 pages
Step 2 Step 1: American International University-Bangladesh
PDF
No ratings yet
Step 2 Step 1: American International University-Bangladesh
5 pages
Preventing Identity Theft Using Blockchain Technology
PDF
No ratings yet
Preventing Identity Theft Using Blockchain Technology
5 pages
Cyber Prevention Basics
PDF
No ratings yet
Cyber Prevention Basics
17 pages
Infrastructure Pentesting PDF
PDF
No ratings yet
Infrastructure Pentesting PDF
13 pages
Security and Social Engineering
PDF
No ratings yet
Security and Social Engineering
11 pages
Principles of Information Security
PDF
No ratings yet
Principles of Information Security
23 pages
1 - Introduction - Week 1 - NS
PDF
No ratings yet
1 - Introduction - Week 1 - NS
46 pages
OWASP Top 10 Sample Report
PDF
No ratings yet
OWASP Top 10 Sample Report
94 pages
Database Security
PDF
No ratings yet
Database Security
26 pages
A Cyber Attack Simulation For Teaching Cybersecurity-4
PDF
No ratings yet
A Cyber Attack Simulation For Teaching Cybersecurity-4
13 pages
An Introduction To Firewalls and The Firewall Selection Process
PDF
No ratings yet
An Introduction To Firewalls and The Firewall Selection Process
10 pages
Phishing Guidance
PDF
No ratings yet
Phishing Guidance
14 pages
Phishing
PDF
No ratings yet
Phishing
25 pages
(Ponemon Institute) Improving The Effectiveness of The Security Operations Center
PDF
No ratings yet
(Ponemon Institute) Improving The Effectiveness of The Security Operations Center
40 pages
CH 6
PDF
No ratings yet
CH 6
38 pages
CCNA Sec 01
PDF
No ratings yet
CCNA Sec 01
11 pages
Web Application Development Dos and Donts
PDF
No ratings yet
Web Application Development Dos and Donts
18 pages
A New Web Application Vulnerability Assessment Framework
PDF
No ratings yet
A New Web Application Vulnerability Assessment Framework
20 pages
7 ITE403 Whitman Ch05 W5C2
PDF
No ratings yet
7 ITE403 Whitman Ch05 W5C2
19 pages
Unit-4 Ip Security: Benefits of Ipsec
PDF
No ratings yet
Unit-4 Ip Security: Benefits of Ipsec
12 pages
Penetration Testing
PDF
No ratings yet
Penetration Testing
12 pages
RBC Cyber Security Crisis Management Template For Smbs - Final - en
PDF
No ratings yet
RBC Cyber Security Crisis Management Template For Smbs - Final - en
8 pages
PPT Ch02-Amr PDF
PDF
No ratings yet
PPT Ch02-Amr PDF
57 pages
Sample Exam: Exam Name - Certified Information Systems Security Tester (CISST) ™ Exam Code - CISST-001
PDF
No ratings yet
Sample Exam: Exam Name - Certified Information Systems Security Tester (CISST) ™ Exam Code - CISST-001
4 pages
Cyber Security Workshop Lab File Complete
PDF
No ratings yet
Cyber Security Workshop Lab File Complete
43 pages
NCSC-TG-023 A Guide To Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)
PDF
No ratings yet
NCSC-TG-023 A Guide To Security Testing and Test Documentation in Trusted Systems (Bright Orange Book)
124 pages
Ase 2 Paloaltonetworks
PDF
No ratings yet
Ase 2 Paloaltonetworks
5 pages
Web Engineering: Assignment No 3: Firewall
PDF
No ratings yet
Web Engineering: Assignment No 3: Firewall
9 pages
1.lecture 1 Intro
PDF
No ratings yet
1.lecture 1 Intro
75 pages
Seven Steps To Creating An Effective Computer Security Incident Response Team
PDF
100% (1)
Seven Steps To Creating An Effective Computer Security Incident Response Team
8 pages
Securing Web Portals
PDF
No ratings yet
Securing Web Portals
12 pages
OSCP CheatSheet
PDF
No ratings yet
OSCP CheatSheet
1 page
Cyber Security Training Cum Certification Program
PDF
No ratings yet
Cyber Security Training Cum Certification Program
6 pages
Cissp 6
PDF
No ratings yet
Cissp 6
67 pages
Introduction To Cybersecurity Management 1
PDF
No ratings yet
Introduction To Cybersecurity Management 1
13 pages
Network Security Threats and Mitigation Strategies
PDF
No ratings yet
Network Security Threats and Mitigation Strategies
36 pages
30 Cybersecurity Search Engines For Researchers
PDF
No ratings yet
30 Cybersecurity Search Engines For Researchers
2 pages
Thesis Pentest-Methods Public
PDF
No ratings yet
Thesis Pentest-Methods Public
71 pages
Cbac ZPF
PDF
0% (1)
Cbac ZPF
102 pages
0290 Cyber Safety Basics Tutorial
PDF
No ratings yet
0290 Cyber Safety Basics Tutorial
23 pages
Database Security Management
PDF
No ratings yet
Database Security Management
3 pages
Gfce Global Good Practices: National Computer Security Incident Response Teams (Csirts)
PDF
No ratings yet
Gfce Global Good Practices: National Computer Security Incident Response Teams (Csirts)
24 pages
Network Security
PDF
No ratings yet
Network Security
17 pages
8 Social Engineering
PDF
No ratings yet
8 Social Engineering
64 pages