social engineering
play

Social Engineering CS 334 - Computer Security Thanks to: The late - PowerPoint PPT Presentation

Social Engineering CS 334 - Computer Security Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 1 Social


  1. Social Engineering CS 334 - Computer Security Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 1

  2. Social Engineering: Definition � • Social Engineering: “the practice of obtaining confidential information by manipulation of legitimate users.” (from Wikipedia.com) • Attackers “trick” employees into revealing sensitive information, usually to gain access to a computer system: user-ID, password, IP address, etc. 2

  3. Social Engineering: Definition � • A Social Engineer is basically a flavor of “Con- Man” (“Con-Person?) • Historically, Con-Men have been highly successful at convincing victims to give them valuable items (money, jewelry, etc). • Social Engineers employ similar methods aided by modern technology to obtain valuable data from system users. 3

  4. Social Engineering: Definition � • Con-Men and social engineers see their attacks as an art form or a social trade. – The pride themselves on their ability to manipulate a person’s natural tendency to trust others – They are highly skilled and use very effective psychological methods – Some work for personal edification; other work for profit 4

  5. Social Engineering ¨ The end user is usually the weakest link of a system ¤ People are often lazy, ignorant to security, or simply gullible ¨ Social engineering is a journey into social psychology! ¤ Yes I know, that probably doesn’t sound very fun ¤ Well guess what… it is, so deal with it!

  6. But First: Some Examples 6

  7. Case Scenario: Meet Angry Cow � • Angry Cow is a Computer Science student at UW- Madison • Angry Cow just got an eviction notice! 7

  8. Simple Public Information is Found • Angry Cow lives at the Regent • The Regent’s website indicates that it is owned by Steve Brown Properties • Angry Cow wants to “fix” Steve Brown’s record keeping spreadsheet to show that rent has been paid 8

  9. Finding A Way In... • Facebook is Angry Cow’s first weapon of choice because it is an unofficial source of information • Poor controls over data sharing • Lots of important information there that might not seem important, but could be his first step in… • Go to Facebook and search: “Steve Brown Apartments” to find an appropriate unknowing accomplice 9

  10. 10

  11. Let ʼ s See -- Danielle Treu • Born July 24, 1988 • Enjoys playing in the rain, drinking coffee, and spending money • Works at Subway and as a Resident Assistant for Steve Brown Apartments 11

  12. Let ʼ s See -- David Klabanoff • Born April 21, 1979 • Likes Star Wars and The Muppet Movie • Is a Concierge for Steve Brown Apartments 12

  13. Let ʼ s See -- Andrew Baldinger (who made these slides?) • Born March 30, 1986 • Likes kayaking, exploring, and getting lost • Lives at the Regent • Works as a Technology Support Specialist for Steve Brown Apartments 13

  14. Let ʼ s Start with Danielle Treu • Her Facebook profile is pubic, but she is intelligent. She keeps her contact information private • But her profile does say that she attends UW- Madison... • I wonder if they have some more public information about her 14

  15. More Research • UW Whitepages is PUBLIC information • That conveniently provides her email address 15

  16. Primary Contact 16

  17. Establishing the Trust � • Danielle talks to David, and since David trusts Danielle as an “insider”, this trust transfers to the fake Andrew • Angry Cow shows up later that day. David is expecting him. • Angry Cow identifies himself as Andrew and asks David for key to server room 17

  18. The Hack • Angry Cow gets physical access to server, uses a standard password cracking program to get Admin username, password • Angry Cow logs into server and alters accounting files to indicate that his rent has been paid 18

  19. Summary of This Example • Search for public information about your target, using both official and unofficial sources • Build a trust ladder, Danielle trusts Andrew and David trusts Danielle, therefor David will trust Andrew -- even if “Andrew” is really Angry Cow! • Built a credible story • Based on pretexting 19

  20. Pretexting • Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. • It’s more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. 20

  21. Is This Really a Threat to Businesses? • So far, this just looks like a technique employed by angry individuals • Did you know that Hewlett Packard regularly engaged in Social Engineering? • They used the method of pretexting in order to get phone records • Watch the testimony of Patricia Dunn, former Director of HP: http:// pra-blog.blogspot.com/2006/10/ patricia-dunns-incredible- 21

  22. Pretexting Will Likely Continue � • As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many criminal situations and will likely continue to be a security problem in the future. • Pretexting is the most common form of social engineering. • Pretexting is the most common 22

  23. Example: Hacking Paris Hilton ʼ s Phone • In 2005, Paris Hilton’s phone was hacked. The contents of her T-Mobile Sidekick were posted to illmog.org, including the phone numbers of Eminem, Vin Diesel, Lindsay Lohan, and Anna Kournikova. 23

  24. The Steps... • The attackers learn of a programming glitch on the T-Mobile website. They found that a tool on the website contained a vulnerability in a tool on the site that allowed users to reset their account password. • They figure out how to reset the password of any user whose phone was a Sidekick. 24

  25. The Steps... • To get Paris Hilton’s phone number, the attackers get a caller-ID spoofer and call a T-Mobile sales store in California • The conversation goes something like this: – Attacker: “This is [whoever] from T-Mobile Headquarters in Washington. We heard you’ve been having problems with your customer account tools?” – Employee: “No, we haven’t had any problems really. Just a couple of slow downs.” – Attacker: “Yes, that is what is described here in this report. We’re going to have to look into this for a quick second.” 25

  26. The Steps... • The T-Mobile rep gave out the URL of the internal T-Mobile site used to manage customer accounts. • Also gave the username and password used by employees to login. • With Hilton’s phone number, they could use the glitch to reset her password. • This caused a text message to be sent to her phone. • The attackers then called her, using their caller-ID spoofer. 26

  27. The Steps... • Attacker: “There are some network difficulties. Have you been getting any SMS about a password reset? What were the contents of the message? • At this point, she has no idea that her password has really been changed and her account hacked • Since videos and data on the Sidekick are stored on T-Mobile’s central servers, they could download all of Hilton’s info to their own phones. • The hackers were teenagers. – Who appreciated that Hilton had nude photos saved on her Sidekick... 27

  28. Also, gratuitous Matrix sidestory � • Hackers also called Laurence Fishburne, demanding that he “GIVE US THE SHIP!” 28

  29. Now, Back to the “Theory” 29

  30. Social Psychology: Persuasion ¨ A number of variables influence the persuasion process: ¤ The Communicator (Who?) ¤ The Message (What?) ¤ The Audience (Whom?) ¤ The Channel (How?) ¨ For now, let’s focus on “The Communicator”

  31. Social Psychology: Persuasion ¨ The Communicator (Who?): ¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness

  32. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” white lab coat

  33. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” ¤ The “assistant” will give electric shocks in increasing voltages to the “test subject” they can hear via a covered window, but can not see ¤ The “test subject” is actually an actor and is not really getting shocked

  34. Social Psychology: Persuasion ¨ Credibility: “The Milgram Experiment” ¤ After a few shocks, “test subject” actor begins yelling in pain, banging on wall, begging for the shocks to stop ¤ “assistant” members would ask the man in the white coat what to do, upon being told to continue, 65% of “assistants” would go on to administer 450-volt shocks from the switch labeled “dangerous” n By the time the 450-volt switch is reached, the actor has already been dead silent for many minutes

  35. Social Psychology: Persuasion ¨ So what’s the moral of the story? ¤ Most people will obey the man in the white coat ¤ In social engineering, creating the aura of an authority figure allows the adversary to persuade easily, because she has established creditability!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend