Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering. Kimberly Graves
Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering. Kimberly Graves
Gathering Target
Information:
Reconnaissance,
Footprinting, and
Social Engineering.
Chapter 2:
Kimberly Graves
1
9/30/2020
Reconnaissance
• The term reconnaissance comes from the
military and means to actively seek an
enemy’s intentions by Collecting and
gathering information about an enemy’s
composition and capabilities via direct
observation, usually by scouts or military
intelligence personnel trained in surveillance.
• In the world of ethical hacking,
reconnaissance applies to the process of
information gathering.
2
9/30/2020
3
9/30/2020
Information-Gathering Methodology
4
9/30/2020
5
9/30/2020
Footprinting
• Footprinting is defined as the process of creating a
blueprint or map of an organization’s network and
systems. Information gathering is also known as
footprinting an organization.
• Footprinting begins by determining the target system,
application, or physical location of the target. Once this
information is known, specific information about the
organization is gathered using nonintrusive methods.
• For example, the organization’s own web page may
provide a personnel directory or a list of employee bios,
which may prove useful if the hacker needs to use a
social-engineering attack to reach the objective.
6
9/30/2020
7
9/30/2020
8
9/30/2020
9
9/30/2020
10
9/30/2020
11
9/30/2020
12
9/30/2020
13
9/30/2020
14
9/30/2020
15
9/30/2020
Social engineering
• is a manipulation technique used by
cybercriminals to trick people into giving up
confidential information.
• Social engineering relies on the basic human
instinct of trust to steal personal and corporate
information that can be used to commit further
cybercrimes.
common examples of social engineering are:
Phishing: tactics include deceptive emails, websites,
and text messages to steal information.
16
9/30/2020
17
9/30/2020
18
9/30/2020
These examples of social engineering emphasize how emotion is used to commit cyber
attacks:
Fear
You receive a voicemail that says you’re under investigation for tax fraud and that you
must call immediately to prevent arrest and criminal investigation. This social
engineering attack happens during tax season when people are already stressed
about their taxes. Cybercriminals prey on the stress and anxiety that comes with
filing taxes and use these fear emotions to trick people into complying with the
voicemail.
Greed
Imagine if you could simply transfer $10 to an investor and see this grow into $10,000
without any effort on your behalf? Cybercriminals use the basic human emotions of
trust and greed to convince victims that they really can get something for nothing.
A carefully worded baiting email tells victims to provide their bank account
information and the funds will be transferred the same day.
19
9/30/2020
Fear
You receive a voicemail that says you’re under investigation for tax
fraud and that you must call immediately to prevent arrest and criminal
investigation. This social engineering attack happens during tax season
when people are already stressed about their taxes. Cybercriminals
prey on the stress and anxiety that comes with filing taxes and use
these fear emotions to trick people into complying with the voicemail.
20
9/30/2020
Curiosity
Cybercriminals pay attention to events capturing a lot of news coverage
and then take advantage of human curiosity to trick social engineering
victims into acting. For example, after the second Boeing MAX8 plane
crash, cybercriminals sent emails with attachments that claimed to
include leaked data about the crash. In reality, the attachment installed
a version of the Hworm RAT on the victim’s computer.
Helpfulness
Humans want to trust and help one another. After doing research into a
company, cybercriminals target two or three employees in the
company with an email that looks like it comes from the targeted
individuals’ manager. The email asks them to send the manager the
password for the accounting database – stressing that the manager
needs it to make sure everyone gets paid on time. The email tone is
urgent, tricking the victims into believing that they are helping out their
manager by acting quickly.
21
9/30/2020
Urgency
You receive an email from customer support at an
online shopping website that you frequently buy
from telling you that they need to confirm your credit card
information to protect your account. The email language
urges you to respond quickly to ensure that your credit
card information isn’t stolen by criminals. Without
thinking twice and because you trust the online store, you
send not only your credit card information but also your
mailing address and phone number. A few days later, you
receive a call from your credit card company telling you
that your credit card has been stolen and used for
thousands of dollars of fraudulent purchases.
22
9/30/2020
23
9/30/2020
24