Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Social Engineering Presentation

Khaleel Syed
February 19, 2017

Social Engineering Presentation

IA140 - Academic Skills presentation

Khaleel Syed

February 19, 2017
Tweet

Other Decks in Education

Transcript

  1. Interpretations of Social Engineering - “Manipulation of people into divulging

    confidential data” - Oxford Dictionary - “Using cheap dirty tricks to get people to do what you want” - Brian Brushwood
  2. Purpose - Information gathering - Fraud - Infiltration - Penetration

    Testing • White hat hackers: Ethical hackers hired to ensure security within an firm • Black hat hackers: Individuals with a purpose to breach machines
  3. Phishing - Attempt to obtain sensitive information - Disguising as

    a trustworthy entity - Attack surfaces: Email or Phone • Web spoofing: Allows an adversary to modify web pages sent to a victim • Vishing: Voice phishing
  4. Reverse Social Engineering - Three stages: 1) Attacker sabotages their

    systems 2) Convinces victim that he/she can provide support 3) Acquire data maliciously
  5. Spear-phishing - Targeted phishing - Frequent example of an APT

    - Usual payload - Email attachment - Higher success rate (85%) in comparison to regular phishing (20%) - Average impact: £1.28 million
  6. - Reconnaissance - Crafted Email forgeries - Multi-vector attacks -

    “The spear phisher thrives on familiarity. He knows your name, your email address, and at least a little about you.” - Symantec • SSL: Secure Sockets Layer • DNS: Domain Name Server • Man-in-the middle attack: Secret interception of communication between parties Characteristics of Spear-phishing attacks
  7. Defense against Social Engineering attacks - Advancements in Anti-phishing filters

    - Background checks - Don’t rely on security services - Minimise attack surface