Social Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
'''Social Engineering''' is a type of non-technical retrieval of confidential information or gain of access to computer systems. It makes use of characteristics in human behaviour.
'''Social Engineering''' is a type of non-technical retrieval of confidential information or gain of access to computer systems. It makes use of characteristics in human behaviour.


Social Engineering can include:
== Example: telephone call ==
*faking authorities like administrators, members of a certain company,...
Hi,
*trick uninformed or credulous persons
*physical access to written passwords, serial numbers, security related information,...


It's often aimed on:
this is Mallory Malicious from the IT security company. You know, I'm responsible for improving your network's safety. Excuse me for using your time, but I have changed the security mode. Now all users have to be updated if they are to have access again. Would you please give me your password, so I can adjust your account properly?
*retrieval of user data and passwords
*gaining of permissions
*gaining access to networks
*deleting files
*executing actions or programs


Thank you very much


== Example: password retrieval via telephone ==
''Hi,''


''this is Mallory Malicious from the IT security company. You know, I'm responsible for improving your network's safety. Excuse me for using your time, but I have changed the security mode. Now all users have to be updated if they are to have access again. Would you please give me your user name and password, so I can adjust your account properly?''
== Example: virus warning ==
''A "socially engineered" worm could be the following E-Mail:''


''Thank you very much''
Hi Alice,


'''Obtained user name and password for access on foreign network.'''
have you heard of this horrible ABC virus?
I have been infected! All my files were deleted. It's a total chaos.


If you have this virus you MUST delete it!
It hides in your C:\WINDOWS\SYSTEM folder. Look there and delete the EMM386.exe!


== Example: backdoor install via mail ==
Have this mail posted to all your friends, too! They might be infected.
''Dear Sir or Madam,''


''we, the IT security company are responsible for administering your corporate's network. We caught a security hole. Fixing it is of utmost importance to the company. Please help us with downloading and installing the security fix now:''
Bob

''http :// www .reliable-looking-web-address .net/security_fix_2004-11-16.zip''

''Thanks for your cooperation''

'''Installed backdoor or botnet client.'''


== Example: "socially engineered" worm via mail ==
''Hi Alice,''

''have you heard of this horrible ABC virus?''
''I have been infected! All my files were deleted. It's a total chaos.''

''If you have this virus you MUST delete it!''
''It hides in your C:\WINDOWS\SYSTEM folder. Look there and delete the EMM386.exe!''

''Be sure to post this mail to all your friends, too! They might be infected.''

''Bob''

'''Deleted system files and spread a worm.'''

Latest revision as of 20:21, 14 November 2004

Social Engineering is a type of non-technical retrieval of confidential information or gain of access to computer systems. It makes use of characteristics in human behaviour.

Social Engineering can include:

  • faking authorities like administrators, members of a certain company,...
  • trick uninformed or credulous persons
  • physical access to written passwords, serial numbers, security related information,...

It's often aimed on:

  • retrieval of user data and passwords
  • gaining of permissions
  • gaining access to networks
  • deleting files
  • executing actions or programs


Example: password retrieval via telephone

Hi,

this is Mallory Malicious from the IT security company. You know, I'm responsible for improving your network's safety. Excuse me for using your time, but I have changed the security mode. Now all users have to be updated if they are to have access again. Would you please give me your user name and password, so I can adjust your account properly?

Thank you very much

Obtained user name and password for access on foreign network.


Example: backdoor install via mail

Dear Sir or Madam,

we, the IT security company are responsible for administering your corporate's network. We caught a security hole. Fixing it is of utmost importance to the company. Please help us with downloading and installing the security fix now:

http :// www .reliable-looking-web-address .net/security_fix_2004-11-16.zip

Thanks for your cooperation

Installed backdoor or botnet client.


Example: "socially engineered" worm via mail

Hi Alice,

have you heard of this horrible ABC virus? I have been infected! All my files were deleted. It's a total chaos.

If you have this virus you MUST delete it! It hides in your C:\WINDOWS\SYSTEM folder. Look there and delete the EMM386.exe!

Be sure to post this mail to all your friends, too! They might be infected.

Bob

Deleted system files and spread a worm.