Social Engineering Overview | Mind AttacksWhat is social engineering?According to Wiki:
"In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme." According to OWASP:
"Social engineering attacks are are typically carried out by email or by contacting users by phone and impersonating an authorized user, in an attempt to gain unauthorized access to a system or application." According to my Security Researcher friend:
Simple and Easy ways to Perform Social Engineering Attacks:Example Attack 1:
- Social Engineering is being a good actor.
- Social Engineering is getting information by lying to other people.
You can just walk to the front desk and ask, "Who is you System Administrator?" If the staff said, "Sir Francis Al Victoriano is our System Administrator and you can find him at room 321," then you find this man and say, "Hi sir, we have a Security Service to apply to your Server. Can I get to your computer and test it? While you're waiting, you can take a break at the canteen." If the server admins leave, you can take advantage and steal information.Example Attack 2:
Our target is a high-profile website. You need a non suspicious email, but try to use an email by finding the web hosting of that website. For example, they're using web hosting at gomommy.com.
You can use or buy a slightly similar domain name, like gomommyy.com.
As you can see, I used a double y
.You can send an email and try to ask this Server Admin of gomommy.com if you can reset you Cpanel password to 1234qwerty. If you notice the admin of the website is careless, you can get him. Types of Attacks:
Social Media Testing Guide:
- Direct Approach
- See Important Users
- Technical Support
- Email Attacks
- Social Media: Facebook/Twitter/LinkedIn
- Phishing Attacks
- IVR and Robocalls for Credit Card Information
Detecting and Stopping Attacks:
- Protect your identity: use proxies and use other internet connections like Free WiFi to avoid tracking.
- Create a fake email and Facebook account. Use an interesting account, like GIRL, BEAUTIFUL PICTURES, SINGLE, 21-23 YEARS OLD.
- Select the victim and know her/his friends or family before sending an invitation to her/him.
- Become the victim's friend. Chat and become close to her/him and get some sensitive info. Then, download photos and maybe use an infected site and post to her chat box.
- Someone pressures you to do something quickly, be suspicious.
- Someone is asking you for important information
- Someone sends you an email that says you won a million dollars and to send them your bank details.
All you need is PATIENCE. Please note: this information is for educational purposes only.
- Never share your password
- Verify contacts
- Educate staff
- Do not post personal information on any social media
Resources: Regards from:
Philippine Security Researcher