Social Engineering

Social Engineering

Social Engineering is one aspect of Ethical hacking. It involves exploring flaws in humans; how are we as people vulnerable to be socially engineered, such that an attacker can gain advantage to compromise the system that we are trying to protect.

It is a century old tactic. Unknowingly, we encounter it in our homes and are familiar to it.

Social Engineering is the psychological manipulation of people into performing actions or divulging confidential information.

Classic Example of Social Engineering

Trojan Horse is a classic example of social engineering. It dates back to 1188 BC; some thousand years ago. The 10 year old war came to a cease. The Greeks were attacking the city of Troy. As an offering to the city, the Greeks built a horse and filled it with some of their elite soldiers and pretended to sail away from Troy.

No alt text provided for this image


The Trojans carried away the horse as a token of their victory to their Fortress. They celebrated and went to sleep. As night fell, the Greek came out of the Horse and took control of the city. The Greeks fooled the Trojans into thinking the Greeks left the horse as a gesture of defeat. Trojans thought they had won the war. This is a classic pattern of social engineering.

The Attacker being the Greeks, fooling the victims (trojans) into believing the gesture they made, letting their guards down letting them feel relaxed. When Trojans were at their unprepared, the true intent of the Greeks became clear.

Soft Center within the hard?shell

No alt text provided for this image


We spend a lot of amount and resources on firewall system, access control, and antivirus to protect our system. But, behind the control are the humans that are vulnerable. Humans have access to resources, but can be easily engineered to exploit the hard shell systems (firewall, access control and antivirus). It also referred to as the?MnM problem.

No alt text provided for this image

Human Weakness

We, humans have a lot of weaknesses that makes it easier for attackers to exploit us. Let’s discuss some major human weaknesses.

Greed

Most of us are familiar with this email. Some of us might have fallen for it too. Me myself back in 2010 fell for it ?? This is one of the widely used technique in which the attacker tries to exploits the greed nature of human.

No alt text provided for this image

Fear

Here the attacker tries to create fear to the victim and also implied an urgency (48 hours in total).?Urgency?is another weakness of human.

No alt text provided for this image

Urgency

In in an urgent situation, a human tries to act different than he/she normally would. There will be no time for proper judgement and this behavior also makes it easier for an attacker to exploit us. We see urgency in our daily lives too.

No alt text provided for this image

Impersonation

No alt text provided for this image

Curiosity

No alt text provided for this image

Helpfulness

The image below is a perfect example of Helpfulness as a human weakness.

No alt text provided for this image

Types of Social Engineering Attacks

There are two types of attacks used in Social Engineering.

Computer based:?Phishing emails, Malicious Software Update, Viral Hoax

Human bases:?Impersonation, Shoulder surfing, Tail gating

Counter Measures to Social Engineering

Defend against?attackers?both?Electronically?and?Socially

Become?resilient?against such?attacks

  • Defense in both browser and email clients
  • Physical security (chip based id cards, smart security personnel, card enabled gates)
  • Separation of duties and least privileges (Introduce concept of duties; involve more than one person to complete a task, Only give access that is needed to perform a legitimate purpose)
  • Logging, Auditing & Monitoring
  • 2FA

A company can spend hundreds of thousands of dollars on firewall, intrusion detection systems and encryption, and other security Technologies, but if an attacker can call one trusted within the company, and that person complies, and if the attacker gets in, then all that money spent on technology is essentially wasted (Kevin Mitnick)

As humans, we need to be self aware and remain safe. Hope this post gave a new perspective to what we are facing daily. Remain Safe & Protected ????

Shramik A.

DevSecOps Consultant | Automating Infrastructure & Deployment Pipelines | Kubernetes & Docker Enthusiast | Cloud Architecture Expert | Passionate about Continuous Integration & Delivery

3 å¹´

Thanks for sharing

要查看或添加评论,请登录

Manzeel Uprety的更多文章

  • How to install Java on your Amazon EC2 instance?

    How to install Java on your Amazon EC2 instance?

    Last weekend, I was planning to load test an application. Instead of giving tough time to my machine ??, i decided to…

  • Penetration Testing 101: A Key to Safeguarding Client's Data

    Penetration Testing 101: A Key to Safeguarding Client's Data

    Have you ever thought about how much a single error can cost? Let’s say, we are talking of a data breach. According to…

  • API Testing: What ? Why ? How ?

    API Testing: What ? Why ? How ?

    What is an API ? If you are someone in the IT field, you must have definitely heard of API. According to Wikipedia, an…

    2 条评论
  • Blue-Green Deployment

    Blue-Green Deployment

    Blue-Green Deployment is a release technique that reduces downtime and risk by running two identical production…

    1 条评论

社区洞察

其他会员也浏览了