Social Engineering Techniques, Methods, Tools & Mitigation - - PowerPoint PPT Presentation

social engineering
SMART_READER_LITE
LIVE PREVIEW

Social Engineering Techniques, Methods, Tools & Mitigation - - PowerPoint PPT Presentation

Social Engineering Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant Agenda Social Engineering Methodology Attacks & Techniques Demos Tools of the trade Prevention Methods and Advice


slide-1
SLIDE 1

Social Engineering

Techniques, Methods, Tools & Mitigation Panagiotis Gkatziroulis, Security Consultant

slide-2
SLIDE 2

Agenda

  • Social Engineering Methodology
  • Attacks & Techniques
  • Demos
  • Tools of the trade
  • Prevention Methods and Advice
slide-3
SLIDE 3

What is Social Engineering?

slide-4
SLIDE 4

Invest in Products…

slide-5
SLIDE 5

Is Our Security Focus Wrong?

slide-6
SLIDE 6

Why Security Fail???

slide-7
SLIDE 7

Who Are The Threat Actors?

  • Aggrieved ex-employees
  • Internal Employees
  • Activists
  • Corporate Espionage
  • Blackhat Hackers
slide-8
SLIDE 8

Who Are The Targets?

slide-9
SLIDE 9

It Only Needs One…

slide-10
SLIDE 10

Social Engineering Methodology

slide-11
SLIDE 11

Social Engineering - Recon

Digital

  • Search Engines
  • Email Harvesting
  • DNS Records
  • Social Medial
  • Metadata
  • Public Records

Physical

  • Physical Walk
  • Dumpster Diving
  • Tailgate Employees to Lunch Breaks
slide-12
SLIDE 12

Social Engineering - Breach

  • Obtain Domain Credentials via Phishing

Attacks

  • Obtain Network Level Access via Spear

Phishing Attacks

  • Bypass Physical Security Defences and

Obtain Corporate Documents

slide-13
SLIDE 13

Attack Vectors

  • Physical
  • Phishing
  • Telephone
  • Shoulder Surfing
  • Tailgating
slide-14
SLIDE 14

Social Engineering Tactics

  • Impersonation (Spoofed Emails, Telephone

Attacks, Scenario-based attacks)

  • Urgency
  • Obligation
  • Authority
  • Flattering
  • Fear
slide-15
SLIDE 15

Do you recognize the signs?

slide-16
SLIDE 16

Do you recognize the signs?

slide-17
SLIDE 17

Do you recognize the signs?

slide-18
SLIDE 18

NCC Test Case

slide-19
SLIDE 19

Why This Attack Was Successful?

  • 1. Trusted Source // IT Helpdesk
  • 2. Promotes Fear // Accounts will be disabled

Lesson Learned? Always Validate the Origin of the Information!!!

slide-20
SLIDE 20

Tools of The Trade

  • SET
  • TheHarvester
  • Recon-NG
  • Phishing Frenzy
  • PwnPlug Devices
slide-21
SLIDE 21

Physical to Cyber is Just One Port Away….

slide-22
SLIDE 22

Do You See These Stuff Often Internally?

slide-23
SLIDE 23

Mitigations

  • Limit Online Exposure
  • Email and Web Gateway Solutions (URL Sandboxing etc.)
  • Anti-tailgating Barriers
  • Social Engineering Assessments
  • Increase User Awareness via Trainings
  • Policies (Escort visitors etc.)
slide-24
SLIDE 24

Conclusion

  • False Sense of Security (PCI DSS, Products

etc.)

  • Management People are Reactive NOT

Proactive

  • Strong Physical && Weak Human == Pwned
  • Employees Must Feel Safe to Click Any Link

Inside Their Company Environment!!!

slide-25
SLIDE 25

Any Questions???

slide-26
SLIDE 26

Website: trustforum.nccgroup.com Twitter: @NCCTrustForum Email: trustforum@nccgroup.com

slide-27
SLIDE 27

UK Offices

Manchester - Head Office Cheltenham Edinburgh Leatherhead London Thame

North American Offices

San Francisco Atlanta New York Seattle

Australian Offices

Sydney

European Offices

Amsterdam - Netherlands Munich – Germany Zurich - Switzerland