Professional Documents
Culture Documents
Social Engineering and Physical Security
Social Engineering and Physical Security
Physical Security
გიორგი
ახალაია
კავკასიის ტექნოლოგიების სკოლა
თბილისი, 2022
Overview
• Concept of Social-Engineering
• Types of SE
• Examples
• Tools for SE
Dumpster diving
It requires you to get down and dirty, digging through the trash for useful
information. Rifling through the dumpsters, paper-recycling bins, and office
trashcans can provide a wealth of information.
Impersonation
In this attack, a social engineer pretends to be an employee, a valid user, or even an
executive (or other VIP). an attacker can gain physical access to restricted areas,
thus providing further opportunities for attacks.
Technical support
A form of impersonation, this attack is aimed at the technical support staff
themselves. an attacker can call up posing as a user and request a password reset.
The help desk person, believing they’re helping a stranded customer, unwittingly
resets a password to something the attacker knows, thus granting him access the
easy way.
Human Based Social
Engineering
Shoulder surfing
An attacker taking part in shoulder surfing simply looks over the shoulder of a user
and watches them log in, access sensitive data, or provide valuable steps in
authentication. Shoulder surfing can also be done “long distance,”
4.Exploit the relationship with the victim, and extract the desired
information.
Common Targets of Social
Engineering
Receptionists
Receptionists are meant to be helpful and therefore are not security focused
System administrators
can also be valuable targets of opportunity, again because of the
information they possess
Executives
individuals in these types of positions are not focused on security. In fact,
many of the people in these positions focus on business processes, sales,
finance, and other areas.
Users
are probably one of the biggest sources of leaks because they are the ones
who handle, process, and manage information day to day.
Email
Phishing
• Phishing uses a legitimate-looking email that entices you to
click a link or visit a website where your information will be
collected.
Sender’s address
Phishers use email spoofing to create fake email addresses that look like they were sent
from legitimate ones. With email address spoofing, the sender’s name is visible, but
the email address is sometimes hidden.
Attachments
Most email filters scan for known phishing URLs only in the body of the email. To get
around this, phishers often bury the URL in an attachment.
Anatomy of a Phishing Email
Phishing links
It is a URL that directs a user to a phishing page that impersonates a popular brand.
Phishing links are hidden behind anchor text with calls to action such as “ Sign in,”
“View here,” “Click here,” “Preview document,” and “Update account settings.”
Legitimate links
The more links the email includes, the less likely the user is to check
each and every link. Additionally, when an email includes links to
helpful resources, such as a support email address, the email appears
even more legitimate in the eyes of a user.
Email Phishing
Fa
ke
https://emkei.cz Em
ail
ლექციაში განხილული თემები განსაზღვრულია მხოლოდ საგანმანათლებლო მიზნებისთვის და მისი გამოყენება დაშვებულია მხოლოდ
საკუთარ კომპიუტერულ სისტემაზე
Email Phishing –”Show Original”
Fa
ke
Em
ai
l
Detecting Phishing Web Pages
https://phishtank.com/
Phishing Tools
Installation:
$sudo apt update
$sudo apt upgrade -y
$sudo apt install git wget php unzip curl -y
$git clone https://github.com/AbirHasan2005/ShellPhish
$cd ShellPhish
$sudo chmod +x *.sh
$bash ./shellphish.sh
phish ShellPhish
Shell
Download Link
SET
ვიდეოს ბმული
ლექციაში განხილული თემები განსაზღვრულია მხოლოდ საგანმანათლებლო მიზნებისთვის და მისი გამოყენება დაშვებულია მხოლოდ
საკუთარ კომპიუტერულ სისტემაზე
Scareware Trojans
“There is no patch for human stupidity.”
To stay protected against social
engineering attacks, it’s important to
recognize the power of ego.
Physical Security
Physical measures
Include all the things you can touch, taste, smell, or get shocked by. For example,
lighting, locks, fences, and guards with Tasers are all physical measures.
Technical measures
For example, authentication and permissions may not come across as physical
measures, but if you think about them within the context of smart cards and
biometrics, it’s easy to see how they should become technical measures for
physical security.
Operational measures
are the policies and procedures you set up to enforce a security-minded
operation. For example, background checks on employees, risk assessments on
devices, and policies regarding key management and storage would all be
considered operational measures.
გმადლობ
ყურადღებისთვის!