CertCities.com -- The Ultimate Site for Certified IT Professionals
Free CertCities.com Newsletter via E-mail Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Saturday: April 5, 2014


 Dulaney on Certs  
Emmett Dulaney
Emmett Dulaney


 A Visual Guide to Social Engineering
There are many ways for hackers and thieves to put your IT operations in jeopardy -- and not all of them come from the Internet. Here are five examples.
by Emmett Dulaney  
4/6/2011 -- "Social engineering" is a popular buzzword these days in IT security, and with the upcoming release of the SY0-301 version of the CompTIA Security+ exam, social engineering is moved even more into the forefront of attention. This visual guide, based on definitions in the Security+ Study Guide, 5th Edition, illustrates five of the most popular types of social engineering.

One of the best things about most of these problems is that the name telegraphs the predicament. While as an IT administrator, there is no way to prevent someone from trying these tactics against your company, educating users about them is the best way to prevent them from being successful. The more they are aware of their presence and potential harms, the more likely they can help thwart them.

Tailgating
"Tailgating" involves following someone so closely that when they enter a door to which you don't have access, you're able to slip in behind them without providing proper authentication. The picture illustrates one method of successfully doing this -- having your hands full so that the person you're following feels guilty if they don't offer help with the door. Most of the time, you don't think about an intruder bringing things into the place they are sneaking into and so it makes it less likely for you to identify them as an intruder. While the intruder in this image is carrying a heavy box, this could be replaced by cases of water, cumbersome packages, or almost anything else that might make a normal person feel guilty if they don't offer the simplest form of assistance -- holding the door.

Fig1

While an administrator should educate their users not to ever hold the door for anyone else and allow tailgating to occur, there are so many situations where they might let their guard down. What if the intruder is on crutches? In a wheelchair? Dressed like the delivery man?

NOTE: Any time the intruder pretends to be someone they are not -- be it the delivery man, a security guard, or the new vice president, -- it constitutes impersonation.

Social engineering always takes advantage of the gullibility of another, and gaining access to a place where an intruder should not be is one of the first things they might do in order to start accessing data that is supposed to be off-limits.

Shoulder Surfing
"Shoulder surfing" involves looking over someone's shoulder while they are working. Doing so, the intruder hopes to gain information such as usernames or passwords that they can then use to access the system as the other person. While the miscreant can't always be there during the login to oversee that information, there is other intercepted data that can be damaging as well: payroll information, e-mail addresses of key personnel, and so on. It is a good idea for users to not have their monitors positioned in ways that make it easy for this act to occur, but they need to also understand and appreciate that such an attack can occur away from the desk as well: in any public location where they sit with their laptops, at business travel centers in hotels, and so on.

Fig2

Dumpster Diving
To realize the ramifications of a "dumpster diving" attack, think only for a moment of all the information that goes into the trash. If it is possible to find a list of users at a company, then half of the information needed to gain access in a username/password authentication scheme has been gathered. Rarely do usernames differ from either being the first initial of the first name and the full last name, or the first initial of the first and middle name and the full last name.

Fig3

If a user scribbled down a password on a piece of paper when they changed it and kept that paper only until they memorized the new string value, then the attacker has found a goldmine. If the attacker is not so lucky as to find that password itself, they may just be able to find the names of things related to a user or users -- all of which are often the basis for what becomes their password.

On a completely different vein from authentication information, it may be possible to gain information about customers and suppliers -- all of whom can be targeted for attacks or smears. What if the attacker pretends to be a representative of your company and contacts customers armed with gold the dumpster dive has uncovered and begins harassing them in an attempt to jeopardize your relationship? What if they publish data found on the Web for all to see?

An easy solution is to shred and destroy all paper documentation. It may keep the Cub Scout pack from being able to use your paper in their recycling fundraiser, but it also keeps your company a lot safer.

Phishing
"Phishing" involves trying to collect important, sensitive, information from a user through the Internet. One of the most common ways to do this is to contact a user and tell them something is wrong with their account and that they need to go to a site and verify their information to correct the problem. Often, the messages will appear to come from a legitimate site -- PayPal, eBay and Wells Fargo are commonly used -- but the links in the message actually take the user to a bogus site where their username, password and any other information the user willingly provides (credit card numbers, date of birth, etc.) can be collected.

Fig4
[Click on image for larger view.]

The example in the figure is a variation on the standard attack. In this case, it is made to look as if the user submitted an order and there is a problem with the order.

The attacker's hope is that the user will respond by going to the site to report that they placed no such order. At the site, attempts will be made to collect as much information as possible which can then be used to capitalize on the user's data. Even just getting the user to come to the site and then immediately leave serves the purpose of alerting the attacker that their message went to a valid e-mail address and one worth targeting another attack to. Users should be well educated on all aspects of phishing and instructed to not respond to such attempts in any way.

A number of variations of phishing exist, including vishing, spear phishing and whaling.

Hoaxes
A "hoax" preys upon fear. Users are constantly hearing about viruses, worms and other forms of malware that can damage their data. Sometimes, the threats aren't real at all, but merely fabrications intended to alarm the users. The miscreant in this case may simply delight from seeing the panic spread and take joy in knowing that they caused such an alarm or they may have another motive.

That other motive could be driven by capitalism or a desire to do even more harm. As an example, suppose a hoax rampantly spreads that the new dulaney64 virus is on the loose and it will completely wipe out any infected hard drive instantly. The only known way to stop this virus is by installing the KeepSafe Anti-Dulaney software package which can be downloaded for $20 from the same entity that spread the hoax. The hoax, in this case, serves as a great way to drum up business and make money off of those naïve enough to fall for it. The software purchased serves no real purpose. 

Fig5

Offering a far more disastrous consequence is spreading the same hoax but now making KeepSafe a true virus and even going so far as to give it away for free. The susceptible hear of the dangers of dulaney64 -- which really doesn't exist -- and they rush to install KeepSafe to protect themselves. Once KeepSafe is on their machine, it begins doing its malicious work, which could include deleting files, altering data, acting as adware or spyware, spreading across the network to every PC it can identify, or any number of other possibilities.

Hoaxes can be particularly tricky to combat since you want your users to know the dangers that exist in IT and the best way is by making them aware of what is out there -- an act in and of itself which can lend to their being quick to respond as soon as they hear of such a hoax and innocently falling for it. The best solution is to have the users contact you immediately as soon as they hear/fear a potential threat and not take any other action without your direction.

Summary
The five social engineering types discussed here are far from all that exist, but represent the most common ones. The key to minimalizing the impact they can have in your environment lay in educating your users. Regularly remind them of the dangers that each characterizes and encourage them to come to you or other members of the IT staff with any and all questions they have.


Emmett Dulaney is the author of several books on Linux, Unix and certification. He can be reached at .

 


More articles by Emmett Dulaney:

-- advertisement --


There are 42 CertCities.com user Comments for “A Visual Guide to Social Engineering”
Page 1 of 5
7/1/13: louis vuitton outlet online from [email protected] says: ths louis vuitton outlet online http://www.louisvuittonttoutlet.com
7/5/13: gucci outlet online from [email protected] says: nice articles gucci outlet online http://www.guccioutletstore-online.com
7/5/13: christianlouboutinoutleta.com from [email protected] says: good share. christianlouboutinoutleta.com http://www.christianlouboutinoutleta.com
7/23/13: Fake Oakleys from [email protected] says: Way too Chaotic To Address sunglass ? Fake Oakleys http://www.fake-oakleysus.com
7/24/13: OakleySunglassesOnSa from [email protected] says: The Incredible Rewarding Effectiveness Of the sunglass Oakley Sunglasses On Sale http://www.fake-oakleysus.com
7/25/13: cheapurbandecaymakeu from [email protected] says: Right here is the makeup truths your mother and father doesn't want you to discover ! cheap urban decay makeup http://www.maccosmeticswholesaler2013.com
7/25/13: cheap Herve Leger outlet from [email protected] says: thank you for share! cheap Herve Leger outlet http://www.herveleger-outlet.co.uk/
7/26/13: Fitflops Clearance from [email protected] says: Incredible Resolution Of The Classic shoes Fitflops Clearance http://www.fitflopsshoesoutlet.com
7/27/13: OakleySunglassesChea from [email protected] says: Own a sunglass Without the need for Putting in A Single Dollar Oakley Sunglasses Cheap http://www.usa-fakeoakleys.com
7/29/13: viviennewestwoodsale from [email protected] says: The Lazy Man's Secret To The shoes Achievement vivienne westwood sale http://www.viviennewestwoodcheapest.co.uk
First Page   Next Page   Last Page
Your comment about: “A Visual Guide to Social Engineering”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top