Social Engineering
Social Engineering
SOCIAL
ENGINEERING
It uses psychological manipulation to trick
users into making security mistakes or giving
away sensitive information. The term is used
for a broad range of malicious activities
accomplished through human interactions.
HOW SOCIAL ENGINNERING
WORKS
Most social engineering attacks rely on actual communication between attackers and
victims. The attacker tends to motivate the user into compromising themselves, rather
than using brute force methods to breach your data. The attack cycle gives these
criminals a reliable process for deceiving you.
Investigation- is when an attacker Hook- involves the initial
performs their reconnaissance . interaction with the target;
They might choose their targets ranging from email to in person
based on position within an contact. During the hook, the
organization, ease of access, or attackers focus is on spinning a
they might choose a wide range web of lies to manipulate victims
STEPS FOR A
of targets just to see what sticks. at their will
SOCIAL
ENGINEERING
ATTACK Exit- points to the end of the Play- gains a stronger foothold
lifecycle. The social engineer will and carries out the attack.
attempt to remove all traces of Depending on their goals, they
their presence and bring an end will begin disrupting or stealing
to their charade. sensitive and valuable data.
Phishing - This is a fraudulent practice of sending emails purporting to be from
reputable companies in order to induce individuals to reveal personal
information, such as passwords and credit card numbers.
Types of social information such as bank receipts, notes with passwords and private
information.
engineering
attacks Baiting- This is a type of social engineering attack that involves enticing a user’s
to engage with some type of media. These attacks come in two forms, digital
and physical.
Scareware- Involves victims being bombarded with false alarms and fictitious
threats. Users are deceived to think their system is infected with malware,
prompting them to install software that has no real benefit (other than for the
perpetrator) or is malware itself. Scareware is also referred to as deception
software, rogue scanner software and fraud ware.
1. Maltego
SOFTWARE This information can be used to simulate a social engineering attack in order to help us
evaluate our employees' security awareness.
ENGINEERING u The Social Engineering Toolkit is an open-source, python-driven toolkit for social
engineering penetration testing. SET offers several custom attack vectors that
allow us to quickly set up a reliable attack in no time.
TOOLS 3. Wifiphisher
Damaged reputation
Have a structured
Train staff to be Impose proper
program for Rollout sensible
alert and credential
regular software restrictions
cautious tracking
updates
Hold every
Implement
Train staff to verify department Increase physical
backups with
all requests accountable for security
best practices security
Take advantage
of resources (i.e.
companies
firewall filters)
1. Invasion of privacy
2. Data is compromised
3. Loss of Funds
social 1.
2.
Be alert and cautious of the information you give to people
Proper disposal of confidential documents
engineering 3. Ignore any request for personal information or passwords
sent to your email.
tools on an 4. Reject request for help or offers for help.
1. Social Engineering in Kali Linux - java point. www.javatpoint.com. (n.d.). Retrieved October 24,
2022, from https://www.javatpoint.com/social-engineering-in-kali-linux
2. Gonzalez, C. (2022, May 3). Top 5 social engineering techniques and how to prevent them. Exabeam.
Retrieved October 24, 2022, from https://www.exabeam.com/information-security/top-8-social-
engineering-techniques-and-how-to-prevent-them-2022/
3. Kaspersky. (2022, March 9). What is social engineering? www.kaspersky.com. Retrieved October 24,
2022, from https://www.kaspersky.com/resource-center/definitions/what-is-social-engineering
4. ID Agent. (2020, August 4). 3 tools to stop social engineering attacks in their tracks. ID Agent.
Retrieved October 24, 2022, from https://www.idagent.com/blog/3-tools-to-stop-social-engineering-
attacks-in-their-tracks
5. Kali Linux: Top 5 tools for Social Engineering. InfoSec Resources. Retrieved October 24, 2022, from
https://resources.infosecinstitute.com/topic/kali-linux-top-5-tools-for-social-engineering/