Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
65 views
Module 9 Social Engineering
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 9 Social Engineering For Later
Download
Save
Save Module 9 Social Engineering For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
65 views
Module 9 Social Engineering
Uploaded by
Nghia Tran Van
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Module 9 Social Engineering For Later
Carousel Previous
Carousel Next
Save
Save Module 9 Social Engineering For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 83
Search
Fullscreen
é NX CEH Certified |] Ethical Hacker LY Cfo lt (tet: Social EngineeringEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering Module Objectives o Understanding Socal Engineering Concepts . Understanding Various Socal Engincering Techniques Understanding inser Threats Understanding impersonation on Socal Networking Sites Understanding identity Theft Understanding Different Socal Engineering Countermeasures Understanding oiferent inser threats and identity Theft Countermeasures Module Objectives This module provides an overview of social engineering. Although it focuses on fallacies and advocates effective countermeasures, the possible methods of extracting information from another human being rely on attackers’ ingenuity. The features of these techniques make them. art, but the psychological nature of some of these techniques makes them a science. The “bottom line” is that there is no ready defense against social engineering; only constant vigilance can circumvent some social engineering techniques used by attackers. This module provides insight into human-based, computer-based, and mobile-based social engineering techniques. It also discusses various insider threats — impersonation on social networking sites, identity theft, as well as possible countermeasures. At the end of this module, you will be able to: * Describe social engineering concepts Perform social engineering using various techniques * Describe insider threats Perform impersonation on social networking sites = Describe identity theft Apply social engineering countermeasures Apply knowledge of insider threats and identity theft countermeasures Module 09 Page 1198 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker aie Module Flow (Q) strmeemscoeen | (Ca) recy 2 sec tagmenmgrectnies | 5 identity Theft 3 insider Threats 6 Countermeasures Social Engineering Concepts There is no single security mechanism that can protect from the social engineering techniques used by attackers. Only educating employees on how to recognize and respond to social engineering attacks can minimize attackers’ chances of success. Before going ahead with this module, itis first necessary to discuss various social engineering concepts. This section describes social engineering, frequent targets of social engineering, behaviors vulnerable to attack, factors making companies vulnerable to attack, why social engineering is effective, the principles of social engineering, and the phases of a social engineering attack Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Module 09 Page 3199 ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering What is Social Engineering? {© socal engineering I the arto convincing people to reveal confidential Information |@ Common targets of social engineering include helpdesk personnel technical support executives, 5st sdminstraors, ete. | Soca engineers deena on the fet that people are unaware othe able information to which they have access nd ace careless about protecting t Impsctot AttckonanOrgnizton _MehaviaraVunerblet tac scrote = asneny emeaen amet eon a eto coor BI 2 anton 2 uaer 2 vst abitin al €or mann ne ito What is Social Engineering? (Cont’d) CEH Factors that Make Companies ‘Why is Soctal Engineoring ‘Vulnerable to Attacks Tsfective? (© Insufficient security traning “a Securty policies areas strong as thelr weakest ink, Ct ‘and human behavior isthe most susceptible factor |S Unregulated access to information (Gis dca to detect soca engineering attempts |G: Several organizational units |G Theres method that can be applied to ensure “© ack of security polices compete sect fomsoea engreeing sacks 8 Tee's no specie software or hardware to a. defend pint 9 seca engineering ance What is Social Engineering? Before performing a social engineering attack, the attacker gathers information about the target organization from various sources such as: + The organization’s official websites, where employees’ IDs, names, and email addresses are shared ‘Module 09 Page 1200 Ethical Making and Countermeasures Copyight © by E-Caunedl ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering + Advertisements of the target organization cast through media reveal information such as products and offers. Blogs, forums, and other online spaces where employees share basic personal and organizational information. After gathering information, an attacker executes social engineering attacks using various approaches such as impersonation, piggybacking, tailgating, reverse social engineering, and other methods. Social engineering is the art of manipulating people to divulge sensitive information to use it to perform some malicious action. Despite security policies, attackers can compromise an organization's sensitive information by using social engineering, which targets the weakness of people. Most often, employees are not even aware of a security lapse on their part and inadvertently reveal the organization’s critical information. For instance, unwittingly answering strangers’ questions or replying to spam email. To succeed, attackers take a special interest in developing social engineering skills and can be so proficient that the victims might not even notice the fraud. Attackers always look for new ways to access information. They also ensure that they know the organization's perimeter and the people on its perimeter, such as security guards, receptionists, and help-desk workers, to exploit human oversight. People have conditioned themselves to not be overly suspicious, and they associate specific behaviors and appearances with known entities. For instance, a man in a uniform carrying a pile of packages for delivery will be perceived as a delivery person. With the help of social engineering tricks, attackers succeed in obtaining confidential information, authorization, and access details from people by deceiving and manipulating human vulnerability. Common Targets of Social Engineering A social engineer uses the vulnerability of human nature as their most effective tool. Usually, people believe and trust others and derive fulfillment from helping the needy. Discussed below are the most common targets of social engineering in an organization: Receptionists and Help-Desk Personnel: Social engineers generally target service-desk or help-desk personnel by tricking them into divulging confidential information about the organization. To extract information, such as @ phone number or password, the attacker first wins the trust of the individual with the information. On winning their trust, the attacker manipulates them to get valuable information. Receptionists and help-desk staff may readily share information if they feel they are doing so to help a customer, «Technical Support Executives: Another target of social engineers is technical support ‘executives. The social engineers may take the approach of contacting technical support executives to obtain sensitive information by pretending to be senior management, customers, vendors, or other figures. system Administrators: A system administrator in an organization is responsible for maintaining the systems. Thus, they may have critical information such as the type and ‘Module 09 Page 1201 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering version of OS and admin passwords, that could be helpful for an attacker in planning an attack. Users and Clients: Attackers could approach users and clients of the target organization, pretending to be a tech support person to extract sensitive information Vendors of the Target Organization: Attackers may also target the vendors of the organization to gain critical information that could help in executing attacks. Senior Executives: Attackers could also approach senior executives from various departments such as Finance, HR, and CxOs to obtain critical information about the organization Impact of Social Engineering Attack on an Organization Social engineering does not seem like a serious threat, but it can lead to substantial losses for organizations. The impact of social engineering attack on organizations include: Economic Losses: Competitors may use social engineering techniques to steal sensitive information such as the development plans and marketing strategies of the target company, which can result in an economic loss. Damage to Goodwill: For an organization, goodwill is important for attracting customers. Social engineering attacks may damage that goodwill by leaking sensitive ‘organizational data. Loss of Privacy: Privacy is a major concern, especially for big organizations. If an ‘organization is unable to maintain the privacy of its stakeholders or customers, then. people can lose trust in the company and may discontinue their business association with the organization. Consequently, the organization could face losses. Dangers of Terrorism: Terrorism and anti-social elements pose a threat to an organization’s assets — people and property. Terrorists may use social engineering techniques to make blueprints of their targets to infiltrate their targets. Lawsuits and Arbitration: Lawsuits and arbitration result in negative publicity for an organization and affects the business’s performance. Temporary or Permanent Closure: Social engineering attacks can result in a loss of goodwill. Lawsuits and arbitration may force the temporary or permanent closure of an organization and its business activities. Behaviors Vulnerable to Attacks Authority Authority implies the right to exercise power in an organization. Attackers take advantage of this by presenting themselves as a person of authority, such as a technician or an executive, in a target organization to steal important data For example, an attacker can call a user on the phone and can claim to be working as a network administrator in the target organization. The attacker then informs the victim about a security incident in the network and asks them to provide their account ‘Module Page 1202 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering credentials to protect their data against theft. After obtaining the victim's credentials, the attacker steals sensitive information from the victim's account = Intimidation Intimidation refers to an attempt to intimidate a victim into taking several actions by using bullying tactics. It is usually performed by impersonating some other person and manipulating users into disclosing sensitive information. For example, an attacker might call the executive's receptionist with this request: “Mr. Tibiyani is about to give a big presentation to the customers, but he is unable to open his files; it seems they are corrupt. He told me to call you and ask you to send the files to me immediately so that he can start his talk.” © Consensus or Social Proof Consensus or social proof refers to the fact that people are usually willing to like things or do things that other people like or do. Attackers take advantage of this by doing things like creating websites and posting fake testimonials from users about the benefits of certain products such as anti-malware (rogueware). Therefore, if users search the Internet to download the rogueware, they encounter these websites and believe the forged testimonials. Further, if users download the malicious product, attackers may install a trojan along with it. = Scarcity Scarcity implies the state of being scarce. In the context of social engineering, scarcity often implies creating feeling of urgency in a decision-making process. Due to this urgency, attackers can control the information provided to victims and manipulate the decision-making process. For example, when Apple releases a new iPhone product that sells out and goes out of stock, attackers can take advantage of this situation by sending a phishing email to the target users, encouraging them to click on a link provided in the email to buy the product. If the users click on this link, they get redirected to some malicious website controlled by the attacker. As a result, the user might end up revealing their account details or downloading some malicious programs such as trojans. + Urgency Urgency implies encouraging people to take immediate action. Attackers can take advantage of this by tricking victims into performing unintended tasks. For example, ransomware often uses the urgency principle, which makes the victim take urgent action under a time-limit. The victims see the countdown timer running on their infected systems and know that failure to make the required decision within the given time can result in the loss of important data. Similarly, attackers can send phishing emails indicating that a certain product is available at a low price and that to buy it, the user should click on the “Buy Now” link. The user is ‘Module 09 Page 1203 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering tricked, and they click on the link to take immediate action. As a result, they are redirected to a malicious website and end up revealing their account details or downloading a virus file. Familiarity or Liking Familiarity or liking implies that people are more likely to be persuaded to do something. when they are asked by someone whom they like. This indicates that people are more likely to buy products if they are advertised by an admired celebrity. For example, people are more likely to allow someone to look over their shoulder if they like that person or they are familiar with them. If people do not like the person, they immediately recognize the shoulder surfing attack and prevent it. Similarly, people often allow someone to tailgate them if they like that person or are familiar with them. In some cases, social engineers use a charming smile and sweet-talk to deceive the other person into liking them, Trust Attackers often attempt to build a trusting relationship with victims. For example, an attacker can call a victim and introduce themself as a security expert. Then, they may claim that they were working with XYZ company, and they noticed some unusual errors sent from the victim's system. The attacker builds trust by using the company name and their experience in the security field. After establishing trust, the attacker guides the victim to follow a series of steps to “view and disable the system errors.” They later send an email containing a malicious file and persuade the victim to click on and download it. Through this process, the attacker successfully installs malware on the victim's system, infecting it and allowing the attacker to steal important information. Greed Some people are possessive by nature and seek to acquire vast amounts of wealth through illegal activities. Social engineers lure their targets to divulge information by promising something for nothing (appealing to their greed). For example, an attacker may pretend to be a competitor and lure the employees of the target into revealing critical information by offering a considerable reward. Factors that Make Companies Vulnerable to Attacks Many factors make companies vulnerable to social engineering attacks; some of them are as follows: Insufficient Security Training Employees can be ignorant about the social engineering tricks used by attackers to lure ‘them into divulging sensitive data about the organization. Therefore, the minimum responsibility of any organization is to educate their employees about social engineering techniques and the threats associated with them to prevent social engineering attacks. ‘Module 09 Page 1206 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering Unregulated Access to Information For any company, one of its main assets is its database. Providing unlimited access or allowing everyone access to such sensitive data might cause trouble. Therefore, companies must ensure proper training for and surveillance of key personnel accessing sensitive data. Several Organizational Units ‘Some organizations have their units at different geographic locations, making it difficult to manage the system. Further, this sort of setup makes it easier for an attacker to access the organization's sensitive information. Lack of Security Policies Security policy is the foundation of security infrastructure. It is @ high-level document describing the security controls implemented in a company. An organization should take extreme measures related to every possible security threat or vulnerability. Implementation of certain security measures such as password change policy, information sharing policy, access privileges, unique user identification, and centralized security, prove to be beneficial. Why is Social Engineering Effective? Like other techniques, social engineering does not deal with network security issues; instead, it deals with the psychological manipulation of a human being to extract desired information. The following are reasons why social engineering continues to be effecti Despite various security policies, preventing so human beings are most susceptible to variation, engineering is a challenge because It is challenging to detect social engineering attempts. Social engineering is the art and science of manipulating people into divulging information. No method guarantees complete security from social engineering attacks. No specific hardware or software is available to safeguard against social engineering attacks. This approach is relatively cheap (or free) and easy to implement. ‘Module 09 Page 1205 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel ProhiatedEthical Hacking and Countermeasures ‘eam 31250 Cerfied thea ker Social Engineering Phases of a Social Engineering Attack a © uenpiercvng mebie, employee, tourof the compa cy lect aTarget © katy rn pce th tages) Gigs reer eeneeate © Develop a reatonship with he selected employees nents TT ne nett Phases of a Social Engineering Attack Attackers take the following steps to execute a successful social engineering attack: Research the Target Company Before attacking the target organization’s network, an attacker gathers enough information to infiltrate the system. Social engineering is one technique that helps in extracting information. Initially, the attacker researches basic information about the target organization, such as the nature of the business, its location, number of ‘employees, and other facts. While researching, the attacker indulges in activities such as dumpster diving, browsing the company’s website, and finding employee details. + Select a Target After finishing their research, the attacker selects a target for extracting sensitive information about the organization. Usually, attackers try to reach out to disgruntled ‘employees because they are easier to manipulate. * Develop a Relationship Once the target is set, the attacker builds a relationship with that employee to accomplish their task. Exploit the Relationship The attacker exploits the relationship and extracts sensitive information about the ‘organization’s accounts, finance information, technologies in use, and upcoming plans. ‘Module 09 Page 1206 Ethical Making and Countermeasures Copyright © by E-Cauncil ‘Al Rights Reserved. Reproduction Sel Prohiated
You might also like
CEH v13 AI
PDF
0% (1)
CEH v13 AI
11 pages
Types of Social Engineering
PDF
100% (1)
Types of Social Engineering
34 pages
Social Engineering PDF
PDF
No ratings yet
Social Engineering PDF
2 pages
Social Engineering Guide16
PDF
No ratings yet
Social Engineering Guide16
15 pages
Social Engineering Techniques & Practices
PDF
100% (2)
Social Engineering Techniques & Practices
32 pages
Module 8 Sniffing
PDF
No ratings yet
Module 8 Sniffing
121 pages
Module 10 Denial of Service
PDF
No ratings yet
Module 10 Denial of Service
91 pages
Module 11 Session Hijacking
PDF
No ratings yet
Module 11 Session Hijacking
86 pages
Module 20 Cryptography
PDF
No ratings yet
Module 20 Cryptography
124 pages
Module 12 Evading IDS Firewall and Honeybots
PDF
No ratings yet
Module 12 Evading IDS Firewall and Honeybots
136 pages
Module 1 Introduction To Ethical Hacking
PDF
No ratings yet
Module 1 Introduction To Ethical Hacking
91 pages
Module 16 Hacking Wireless Networks
PDF
No ratings yet
Module 16 Hacking Wireless Networks
209 pages
Module 4 Enumeration
PDF
No ratings yet
Module 4 Enumeration
92 pages
Module 6 System Hacking
PDF
100% (1)
Module 6 System Hacking
291 pages
Module 13 Hacking Web Server
PDF
100% (1)
Module 13 Hacking Web Server
117 pages
Social Engineering: How Yoong Han TP038203 UC2F1704IT (ISS) Ethical Hacking and Incident Response
PDF
No ratings yet
Social Engineering: How Yoong Han TP038203 UC2F1704IT (ISS) Ethical Hacking and Incident Response
5 pages
Social Engineering Test Cases June 9th, 2009
PDF
No ratings yet
Social Engineering Test Cases June 9th, 2009
11 pages
Social Engineering
PDF
100% (1)
Social Engineering
5 pages
NDPX - Social Engineering Awareness
PDF
No ratings yet
NDPX - Social Engineering Awareness
18 pages
CEH Master Brochure
PDF
100% (2)
CEH Master Brochure
14 pages
1-Introduction Ethical Hacking
PDF
100% (1)
1-Introduction Ethical Hacking
16 pages
Module 3 Scanning Networks
PDF
No ratings yet
Module 3 Scanning Networks
154 pages
61 Cybersecurity Job Interview Questions and Answers - Springboard Blog
PDF
0% (1)
61 Cybersecurity Job Interview Questions and Answers - Springboard Blog
10 pages
Social Engineering Attack
PDF
No ratings yet
Social Engineering Attack
51 pages
CCT Battle Card
PDF
No ratings yet
CCT Battle Card
2 pages
Cyber Security - Five Challenge 2022
PDF
No ratings yet
Cyber Security - Five Challenge 2022
7 pages
701 Final Exam
PDF
No ratings yet
701 Final Exam
174 pages
Cybersecurity Policies in The EU, 11.12.2023
PDF
No ratings yet
Cybersecurity Policies in The EU, 11.12.2023
15 pages
Social Engineering.
PDF
No ratings yet
Social Engineering.
2 pages
Necessity For Ethics in Social Engineering
PDF
No ratings yet
Necessity For Ethics in Social Engineering
14 pages
6.2.2.9 Lab - Social Engineering
PDF
No ratings yet
6.2.2.9 Lab - Social Engineering
1 page
EC-Council - CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots Slide 2013
PDF
No ratings yet
EC-Council - CEHv8 Module 17 Evading IDS, Firewalls, and Honeypots Slide 2013
142 pages
CST804 Ethical Hacking and Penetration Testing
PDF
No ratings yet
CST804 Ethical Hacking and Penetration Testing
170 pages
SQL Injection Detection and Prevention Techniques: University Technology Malaysia
PDF
No ratings yet
SQL Injection Detection and Prevention Techniques: University Technology Malaysia
8 pages
(Ceh) : Certified Ethical Hacker (Cehv10) : Course Overview
PDF
No ratings yet
(Ceh) : Certified Ethical Hacker (Cehv10) : Course Overview
4 pages
CEH Prep Guide
PDF
100% (3)
CEH Prep Guide
150 pages
Becoming The Hacker - Adrian Pruteanu
PDF
0% (1)
Becoming The Hacker - Adrian Pruteanu
524 pages
Active Directory Enumeration: Bloodhound: Table of Content
PDF
No ratings yet
Active Directory Enumeration: Bloodhound: Table of Content
27 pages
CEH v12 Lesson 9 - Social Engineering Exploits
PDF
No ratings yet
CEH v12 Lesson 9 - Social Engineering Exploits
7 pages
Network Security
PDF
No ratings yet
Network Security
42 pages
Project SAVE - Social Engineering - Cyber Security Book
PDF
100% (2)
Project SAVE - Social Engineering - Cyber Security Book
193 pages
Network Security
PDF
0% (2)
Network Security
4 pages
CEH Brochure
PDF
No ratings yet
CEH Brochure
24 pages
Unveiling Instagram Hacking
PDF
No ratings yet
Unveiling Instagram Hacking
47 pages
Intro To Python Programming-Syllabus
PDF
No ratings yet
Intro To Python Programming-Syllabus
3 pages
Penetration Testing
PDF
No ratings yet
Penetration Testing
12 pages
SQL Injection Monitoring Security Vulnerabilities in Web Applications
PDF
No ratings yet
SQL Injection Monitoring Security Vulnerabilities in Web Applications
6 pages
I Want To Work in Cyber Security, Should I Major in Computer Science or Information Technology With A Focus in Cyber Security - Quora
PDF
No ratings yet
I Want To Work in Cyber Security, Should I Major in Computer Science or Information Technology With A Focus in Cyber Security - Quora
5 pages
PTS Syllabus
PDF
100% (1)
PTS Syllabus
6 pages
Ethical Hacking: An Impact On Society: April 2014
PDF
No ratings yet
Ethical Hacking: An Impact On Society: April 2014
11 pages
CEH Brochure
PDF
No ratings yet
CEH Brochure
24 pages
CEH Brochure
PDF
No ratings yet
CEH Brochure
24 pages
SQL Injection Prevention PDF
PDF
No ratings yet
SQL Injection Prevention PDF
7 pages
Social Engineering
PDF
No ratings yet
Social Engineering
12 pages
CEHv10 Module 09 Social Engineering
PDF
No ratings yet
CEHv10 Module 09 Social Engineering
72 pages
Report On Ethical Hacking and Social Engineering
PDF
No ratings yet
Report On Ethical Hacking and Social Engineering
7 pages
Ethical_Hacking_Course_01-Mar-2025_07_0 15_3_2025, 7_40_14 am_Page 1-[1742007040946] (1)
PDF
No ratings yet
Ethical_Hacking_Course_01-Mar-2025_07_0 15_3_2025, 7_40_14 am_Page 1-[1742007040946] (1)
1 page
Gray Hat Hacking 101 199
PDF
No ratings yet
Gray Hat Hacking 101 199
99 pages
Social Engineering Attack Life Cycle - The Art of Human Hacking
PDF
No ratings yet
Social Engineering Attack Life Cycle - The Art of Human Hacking
18 pages
Social Engineering: How To Identify and Prevent Social Engineering Cyberattacks - Especially in The Age of COVID-19
PDF
No ratings yet
Social Engineering: How To Identify and Prevent Social Engineering Cyberattacks - Especially in The Age of COVID-19
31 pages