02 SocialEngineering
02 SocialEngineering
Por Samuel
Hernández
What is Social Engineering?
● The term Social Engineering was first used in 1894 to describe the importance of addressing
social problems within industries, and then in 1911 it was used to describe how users of
machinery in companies should work them as if they were social relationships.
● Today the term this term is used in the world of computing to describe the manipulation of
legitimate users of a computer system by attackers looking to harm the system or extract
some kind of valuable information.
A bit of history... (Continued)
● Throughout the era of computer science, social engineering has become very prevalent in
cyberattacks, it is estimated that 1 in 3 cyberattacks contain some form of social engineering
as part of its process.
● These statistics are absolutely alarming, as these numbers continue to rise because
regardless of the security of a computer system, the user in charge of handling it can become
the biggest vulnerability and therefore be able to compromise the security of the entire
system.
● Many people have been able to take advantage of this sad reality and have achieved great
attacks just by sounding convincingly and having the skills to complete the cyberattack. One
of the most notable people in this department is known as Kevin Mitnick, which we will see
below.
Kevin Mitnick: The Artist of Deception
● Known as one of the most feared hackers, Kevin was a very important
figure in the world of hacking, not only for his technical skills, but for his
immense skill for social engineering.
● Kevin started this kind of activity from the age of 12, when he used his
"talents" so as not to have to pay a bus fare in Los Angeles,
accomplished this by convincing the driver by pretending he didn't know
that his card didn't have money or that he had to be on the bus for a
school project.
● After that, he was persecuted and imprisoned for continuing to use his
manipulation skills alongside techniques to gain access to companies
and government agencies.
Summary until now
● Spear Phishing
● Phishing
● Cloning
● 419/Nigerian Phone Phishing Scams
How to identify it?
● It is extremely that when opening the email, recognize who sends it. If
the email or phone number does not appear recognized, or claims to be
from a company you know but the email is not familiar, it can be a
phishing attack.
● Also, these emails usually contain alarming messages to try to induce
some kind of immediate action through fear. This may be another sign.
● The message contains strange attachments or some kind of URL that is
unreliable.
Case Study #1
● Make sure that the numbers are recognized (and in the case of emails as
well).
● Use identification tips to determine if it's an attack.
● Never access any help/reward that is offered as it is a manipulation
tactic.
● Stay on top of your game by following the scamming trends, news, etc.
Other types of social engineering attacks
● Dumpster Diving
● Physical Access Attacks
● Ransomware
● Baiting
Interactive exercise
● In the next exercise, we will enter a website that aims to detect if any
email or password you use has been found within a data breach. This
will help you find out if your credentials and accounts may be at risk
right now.
● URL: https://haveibeenpwned.com/
Important precautions