12 - Low Tech - Social Engineering Secur
12 - Low Tech - Social Engineering Secur
- Can begin with sites like Facebook where information about a person is available
- For instance - if you know Bob is working on a project, an email crafted to him
about that project would seem quite normal if you spoof it from a person on his
project
- **Phishing** - crafting an email that appears legitimate but contains links to
fake websites or to download malicious content
- **Ways to Avoid Phishing**
- Beware unknown, unexpected or suspicious originators
- Beware of who the email is addressed to
- Verify phone numbers
- Beware bad spelling or grammar
- Always check links
- **Spear Phishing** - targeting a person or a group with a phishing attack
- Can be more useful because attack can be targeted
- **Whaling** - going after CEOs or other C-level executives
- **Pharming** - use of malicious code that redirects a user's traffic
- **Spimming** - sending spam over instant message
- **Tools** - Netcraft Toolbar and PhishTank Toolbar
- **Fave Antivirus** - very prevalent attack; pretends to be an anti-virus but is a
malicious tool
- **Physical measures** - everything you can touch, taste, smell or get shocked by
- Includes things like air quality, power concerns, humidity-control systems
- **Technical measures** - smartcards and biometrics
- **Operational measures** - policies and procedures you set up to enforce a
security-minded operation
- **Access controls** - physical measures designed to prevent access to controlled
areas
- **Biometrics** - measures taken for authentication that come from the
"something you are" concept
- **False rejection rate** (FRR) - when a biometric rejects a valid user
- **False acceptance rate** (FAR) - when a biometric accepts an invalid user
- **Crossover error rate** (CER) - combination of the two; determines how good
a system is
- Even though hackers normally don't worry about environmental disasters, this is
something to think of from a pen test standpoint (hurricanes, tornadoes, floods,
etc.)