CEH 9-Social Engineering
What is Social Engineering?
- Social engineering is an art of exploiting humans to gain sensitive information.
- This technique involves tricking people into breaking security standard.
- It is a most significant threat in any organization.
- Common targets of social engineering include help desk personnel, technical support executives, system administrators, etc.
Disclaimer: The
articles provided on HackWithV is purely for informational and
educational purpose only, and for those who are willing and curious to
know & learn about Ethical Hacking, Security and Penetration
Testing. Anytime the word "Hacking" that is used on this site shall be
regarded as Ethical Hacking.
Types of Social Engineering:
- Social engineering is classified based on the techniques used to attack or commit fraud on the victim to steal the sensitive information.
- Types of social engineering attacks are:
- Human-based
- Computer-based
- Mobile-based
1. Human-Based
- In human-based social engineering attacks, the social engineer interacts directly with the target to get sensitive information by performing the various techniques.
- Some of the technique are listed as follow:
- Shoulder surfing
- Dumpster diving
- Tailgating
- Piggybacking
2. Computer Based
- Computer-based social engineering attacks are carried out with the help
of computer software to gain access to the desired information. - Some of these attack types are listed as follows:
- Phishing
- Spam mail
- Popup windows
3. Mobile Based
- In mobile-based social engineering attacks, attackers take advantage of
malicious mobile applications to gain access to the desired information. - Some of the attack types are listed as follows:
- SMishing
- Publish malicious apps
- Repacking legitimate apps
Exploiting Human using Social Engineering
- Social engineering and the human element are common ways to gain access to a network, database, or building.
- Major cyber incidents happen as the result of an attacker gaining initial access using social engineering technique, usually by convincing an insider to unwittingly download or install a piece of malware that opens up the target network to the attacker.
- Attackers employ many tricks to try to get a human target to provide them with information or access.
- They appeal to ego, financial need, curiosity, humanity, or job duties all with the goal of getting the target to either click on a link that redirects the target to a malicious website or opens an attachment that contains malware.
- Humans continue to be the weak link.
- No matter how secure a network, device, system, or organization is from a technical point of view, humans can often be exploited.
- Individuals should be vigilant regarding emails.
- Unsolicited phone calls that attempt to get people to reveal sensitive information.
- Companies should regularly provide security awareness training to employees.
- Lack of the security policies.
- Unregulated access to information.
Some types of Social Engineering Attacks
1. Eavesdropping
- Eavesdropping is a technique used by attackers, to intercept unauthorized and private communication, such as a phone call, instant message, video conference or fax transmission.
- This is done by directly listening to digital or analog voice communication or by intercepting or sniffing data relating to any form of communication.
2. Dumpster diving
- Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container).
- In Information Technology, dumpster diving refers to a technique used to retrieve information that could be used to perform attacks on a computer network.
- Dumpster diving is not limited to searching through the trash for information like access codes or passwords written down on sticky notes.
3. Shoulder Surfing
- Shoulder surfing is noting but direct observation, such as looking over someone's shoulder, to grab sensitive details.
- It is commonly used while someone enters passwords, PIN numbers, security codes at ATMs or on their personal computers.
4. Tailgating and Piggybacking
- A person tags himself with another person who is authorized to gain access into a restricted area, or pass a specific checkpoint is known as Tailgating/Piggybacking.
- Tailgating implies without consent, while piggybacking means approval of the authorized person.
5. Phishing
- Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, financial information), often for malicious reasons, by masquerading as a trustworthy entity in electronic communication.
6. Spear phishing
- Spear phishing is a variation on phishing in which hackers send emails to groups of people with specific common characteristics or other identifiers.
- Spear phishing emails appear to come from a trusted source but are designed to help hackers obtain trade secrets or other classified information.
Mitigations
- Employees in an organization should be aware of security policies and procedures.
- Secure or shred all the documents containing private information.
- Protect your personal information from being published.
- Never store personal/banking information on the mobile device.
Comments
Post a Comment