2
Most read
9
Most read
21
Most read
Social
Engineering
The Art of Social Hacking
By-Ankush Mohanty
Introduction
• What is Social Engineering?
o Manipulate people into doing something, rather
than by breaking in using technical means.This
type of attack is non technical.
• Types of Social Engineering
• Ways to prevent Social Engineering
Social engineering
What is Social Engineering?
• Attacker uses human interaction to obtain or compromise
information
• Attacker my appear unassuming or respectable
o Pretend to be a new employee, repair man, ect
o May even offer credentials
• By asking questions, the attacker may piece enough
information together to infiltrate a companies network
o May attempt to get information from many sources
History of Social Engineering
• The term Social Engineering was made popular ex-
computer criminal Kevin Mitnick.
• Confessed to illegally accessing private networks and
possession of forged documents.
• Claimed to of only used Social Engineering
techniques with no help from software programs.
Kevin Mitnick
Famous Social Engineer Hacker
• Went to prison for hacking
• Became ethical hacker
"People are generally helpful, especially to someone who is
nice, knowledgeable or insistent."
A Quote from Kevin Mitnick
“You could spend a fortune purchasing
technology and services from every exhibitor,
speaker and sponsor at the RSA Conference,
and your network infrastructure could still
remain vulnerable to old-fashioned
manipulation.”
Kevin Mitnick - Art of Deception:
• "People inherently want to be helpful and therefore are
easily duped"
• "They assume a level of trust in order to avoid conflict"
• "It's all about gaining access to information that people think
is innocuous when it isn't"
• Here a nice voice on the phone, we want to be helpful
• Social engineering cannot be blocked by technology alone
Types of Attacks
• Phishing
• Impersonation on help desk calls
• Physical access (such as tailgating)
• Shoulder surfing
• Dumpster diving
• Stealing important documents
• Fake software
• Trojans
Phishing
• Fraudulently obtaining private information
o Send an email that looks like it came from a legitimate
business
o Request verification of information and warn of some
consequence if not provided
o Usually contains link to a fraudulent web page that looks
legitimate
o User gives information to the social engineer
 Ex: Ebay Scam
Phishing continued
• Spear Fishing
o Specific phishing
 Ex: email that makes claims using your name
• Vishing
o Phone phishing
o Rogue interactive voice system
 Ex:call bank to verify information
Prevention:
Honeypot email addresses
Education
Awareness of network and website changes
Impersonation on help desk calls
• Calling the help desk pretending to be
someone else
• Usually an employee or someone with
authority
• Prevention:
– Assign pins for calling the help desk
– Don‟t do anything on someone‟s order
– Stick to the scope of the help desk
Physical access
• Tailgating
• Ultimately obtains unauthorize building access
• Prevention
– Require badges
– Employee training
– Security officers
– No exceptions!
Shoulder surfing
• Someone can watch the keys you press when
entering your password
• Probably less common
• Prevention:
– Be aware of who‟s around when entering your
password
Dumpster diving
• Looking through the trash for sensitive
information
• Doesn‟t have to be dumpsters: any trashcan
will do
• Prevention:
– Easy secure document destruction
– Lock dumpsters
– Erase magnetic media
Stealing important documents
• Can take documents off someone‟s desk
• Prevention:
– Lock your office
– If you don‟t have an office: lock your files
securely
– Don‟t leave important information in the open
Fake Software
• Fake login screens
• The user is aware of the software but thinks
it‟s trustworthy
• Prevention:
– Have a system for making real login screens
obvious (personalized key, image, or phrase)
– Education
– Antivirus (probably won‟t catch custom tailored
attacks)
Trojans
• Appears to be useful and legitimate software
before running
• Performs malicious actions in the background
• Does not require interaction after being run
• Prevention:
– Don„t run programs on someone else‟s computer
– Only open attachments you‟re expecting
– Use an antivirus
Weakest Link?
• No matter how strong your:
o Firewalls
o Intrusion Detection Systems
o Cryptography
o Anti-virus software
• You are the weakest link in computer security!
o People are more vulnerable than computers
• "The weakest link in the security chain is the
human element" -Kevin Mitnick
Ways to Prevent Social Engineering
Training
• User Awareness
o User knows that giving out certain information is bad
• Military requires Cyber Transportation to hold
o Top Secret Security Clearance
o Security Plus Certification
• Policies
o Employees are not allowed to divulge private
information
o Prevents employees from being socially pressured or
tricked
Ways to Prevent Social Engineering
Cont..
• 3rd Party test - Ethical Hacker
o Have a third party come to your company and attempted
to hack into your network
o 3rd party will attempt to glean information from
employees using social engineering
o Helps detect problems people have with security
• Be suspicious of unsolicited phone calls, visits, or email
messages from individuals asking about internal information
• Do not provide personal information, information about
the company(such as internal network) unless authority of
person is verified
General Saftey
• Before transmitting personal information over the internet,
check the connection is secure and check the url is
correct
• If unsure if an email message is legitimate, contact the
person or company by another means to verify
• Be paranoid and aware when interacting with anything that
needs protected
o The smallest information could compromise what you're
protecting
Questions?

More Related Content

PPTX
Social Engineering,social engeineering techniques,social engineering protecti...
PPTX
Social engineering presentation
PPTX
Social engineering hacking attack
PPTX
Social engineering
PDF
Social Engineering Basics
PDF
Social Engineering Attacks & Principles
PPTX
Social engineering
PDF
Social engineering
Social Engineering,social engeineering techniques,social engineering protecti...
Social engineering presentation
Social engineering hacking attack
Social engineering
Social Engineering Basics
Social Engineering Attacks & Principles
Social engineering
Social engineering

What's hot (20)

PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPT
Social Engineering | #ARMSec2015
PPTX
Cybercrime and Security
PPTX
Social engineering: A Human Hacking Framework
PPTX
Social engineering
PPTX
Email phishing and countermeasures
PPTX
Social engineering
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Cyber security
PPT
Phishing
PPTX
Data Security - English
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber Security Awareness Program.pptx
PPTX
Different Types of Phishing Attacks
PDF
Cyber Security
PDF
What is Social Engineering? An illustrated presentation.
PPTX
PPT on Phishing
PDF
Social engineering attacks
PDF
Application Security - Your Success Depends on it
PPT
Presentation of Social Engineering - The Art of Human Hacking
Social Engineering | #ARMSec2015
Cybercrime and Security
Social engineering: A Human Hacking Framework
Social engineering
Email phishing and countermeasures
Social engineering
Social engineering-Attack of the Human Behavior
Cyber security
Phishing
Data Security - English
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Security Awareness Program.pptx
Different Types of Phishing Attacks
Cyber Security
What is Social Engineering? An illustrated presentation.
PPT on Phishing
Social engineering attacks
Application Security - Your Success Depends on it
Ad

Viewers also liked (18)

PPTX
Social Engineering
PPTX
Social Engineering
PPTX
Social Engineering - Human aspects of industrial and economic espionage
PDF
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
PDF
Social Engineering
PDF
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
PPTX
The Art of Human Hacking : Social Engineering
PPTX
Attacking the cloud with social engineering
PDF
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
PDF
Hacking the Helpdesk: Social Engineering Risks
PDF
Social Engineering, or hacking people
PPTX
Social engineering
PPT
Introduction To Information Security
PPTX
Credit card fraud detection
PPTX
Information Security Lecture #1 ppt
PPT
Presentation on fraud prevention, detection & control
PPTX
INFORMATION SECURITY
Social Engineering
Social Engineering
Social Engineering - Human aspects of industrial and economic espionage
Human Engineering workshop by Eternal Power Foundation Team v1.1_28Feb16 PDF ...
Social Engineering
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
The Art of Human Hacking : Social Engineering
Attacking the cloud with social engineering
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Hacking the Helpdesk: Social Engineering Risks
Social Engineering, or hacking people
Social engineering
Introduction To Information Security
Credit card fraud detection
Information Security Lecture #1 ppt
Presentation on fraud prevention, detection & control
INFORMATION SECURITY
Ad

Similar to Social engineering (20)

PDF
Insiders Guide to Social Engineering - End-Users are the Weakest Link
PDF
National Life IT Department's Cyber Security Awareness Presentation
PPTX
Conference about Social Engineering (by Wh0s)
PPT
Social Engineering: "The Cyber-Con"
PPTX
MHTA Social Engineering Presentation - 050917
PPT
Social Engineering: Protecting Yourself on the Campus Network
PDF
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
PPTX
Introduction to Social engineering | Techniques of Social engineering
PPTX
ethical hacking in motion MODULE - II.ppt
PDF
phishing and dumpster diving attacks in socialengineering.pdf
PPT
DNR-Security-Awareness-Training expert.ppt
PDF
Case Study On Social Engineering Techniques for Persuasion Full Text
PPTX
What is social engineering & why it is important
PDF
- Social Engineering Unit- II Part- I.pdf
PPT
Social Engineering threats and concern.ppt
PDF
Social Engineering
PDF
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
PPTX
Social Engineering security Aweness.pptx
PDF
Airport IT&T 2013 John McCarthy
PPSX
Social Engineering - Are You Protecting Your Data Enough?
Insiders Guide to Social Engineering - End-Users are the Weakest Link
National Life IT Department's Cyber Security Awareness Presentation
Conference about Social Engineering (by Wh0s)
Social Engineering: "The Cyber-Con"
MHTA Social Engineering Presentation - 050917
Social Engineering: Protecting Yourself on the Campus Network
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
Introduction to Social engineering | Techniques of Social engineering
ethical hacking in motion MODULE - II.ppt
phishing and dumpster diving attacks in socialengineering.pdf
DNR-Security-Awareness-Training expert.ppt
Case Study On Social Engineering Techniques for Persuasion Full Text
What is social engineering & why it is important
- Social Engineering Unit- II Part- I.pdf
Social Engineering threats and concern.ppt
Social Engineering
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Social Engineering security Aweness.pptx
Airport IT&T 2013 John McCarthy
Social Engineering - Are You Protecting Your Data Enough?

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
DOCX
search engine optimization ppt fir known well about this
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
What is a Computer? Input Devices /output devices
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Modernising the Digital Integration Hub
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
STKI Israel Market Study 2025 version august
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
The various Industrial Revolutions .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hybrid model detection and classification of lung cancer
Taming the Chaos: How to Turn Unstructured Data into Decisions
search engine optimization ppt fir known well about this
Zenith AI: Advanced Artificial Intelligence
What is a Computer? Input Devices /output devices
Final SEM Unit 1 for mit wpu at pune .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Modernising the Digital Integration Hub
sustainability-14-14877-v2.pddhzftheheeeee
NewMind AI Weekly Chronicles – August ’25 Week III
STKI Israel Market Study 2025 version august
A contest of sentiment analysis: k-nearest neighbor versus neural network
Web Crawler for Trend Tracking Gen Z Insights.pptx
The various Industrial Revolutions .pptx
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
Module 1.ppt Iot fundamentals and Architecture
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting started with AI Agents and Multi-Agent Systems
Enhancing emotion recognition model for a student engagement use case through...
Hybrid model detection and classification of lung cancer

Social engineering

  • 1. Social Engineering The Art of Social Hacking By-Ankush Mohanty
  • 2. Introduction • What is Social Engineering? o Manipulate people into doing something, rather than by breaking in using technical means.This type of attack is non technical. • Types of Social Engineering • Ways to prevent Social Engineering
  • 4. What is Social Engineering? • Attacker uses human interaction to obtain or compromise information • Attacker my appear unassuming or respectable o Pretend to be a new employee, repair man, ect o May even offer credentials • By asking questions, the attacker may piece enough information together to infiltrate a companies network o May attempt to get information from many sources
  • 5. History of Social Engineering • The term Social Engineering was made popular ex- computer criminal Kevin Mitnick. • Confessed to illegally accessing private networks and possession of forged documents. • Claimed to of only used Social Engineering techniques with no help from software programs.
  • 6. Kevin Mitnick Famous Social Engineer Hacker • Went to prison for hacking • Became ethical hacker "People are generally helpful, especially to someone who is nice, knowledgeable or insistent."
  • 7. A Quote from Kevin Mitnick “You could spend a fortune purchasing technology and services from every exhibitor, speaker and sponsor at the RSA Conference, and your network infrastructure could still remain vulnerable to old-fashioned manipulation.”
  • 8. Kevin Mitnick - Art of Deception: • "People inherently want to be helpful and therefore are easily duped" • "They assume a level of trust in order to avoid conflict" • "It's all about gaining access to information that people think is innocuous when it isn't" • Here a nice voice on the phone, we want to be helpful • Social engineering cannot be blocked by technology alone
  • 9. Types of Attacks • Phishing • Impersonation on help desk calls • Physical access (such as tailgating) • Shoulder surfing • Dumpster diving • Stealing important documents • Fake software • Trojans
  • 10. Phishing • Fraudulently obtaining private information o Send an email that looks like it came from a legitimate business o Request verification of information and warn of some consequence if not provided o Usually contains link to a fraudulent web page that looks legitimate o User gives information to the social engineer  Ex: Ebay Scam
  • 11. Phishing continued • Spear Fishing o Specific phishing  Ex: email that makes claims using your name • Vishing o Phone phishing o Rogue interactive voice system  Ex:call bank to verify information Prevention: Honeypot email addresses Education Awareness of network and website changes
  • 12. Impersonation on help desk calls • Calling the help desk pretending to be someone else • Usually an employee or someone with authority • Prevention: – Assign pins for calling the help desk – Don‟t do anything on someone‟s order – Stick to the scope of the help desk
  • 13. Physical access • Tailgating • Ultimately obtains unauthorize building access • Prevention – Require badges – Employee training – Security officers – No exceptions!
  • 14. Shoulder surfing • Someone can watch the keys you press when entering your password • Probably less common • Prevention: – Be aware of who‟s around when entering your password
  • 15. Dumpster diving • Looking through the trash for sensitive information • Doesn‟t have to be dumpsters: any trashcan will do • Prevention: – Easy secure document destruction – Lock dumpsters – Erase magnetic media
  • 16. Stealing important documents • Can take documents off someone‟s desk • Prevention: – Lock your office – If you don‟t have an office: lock your files securely – Don‟t leave important information in the open
  • 17. Fake Software • Fake login screens • The user is aware of the software but thinks it‟s trustworthy • Prevention: – Have a system for making real login screens obvious (personalized key, image, or phrase) – Education – Antivirus (probably won‟t catch custom tailored attacks)
  • 18. Trojans • Appears to be useful and legitimate software before running • Performs malicious actions in the background • Does not require interaction after being run • Prevention: – Don„t run programs on someone else‟s computer – Only open attachments you‟re expecting – Use an antivirus
  • 19. Weakest Link? • No matter how strong your: o Firewalls o Intrusion Detection Systems o Cryptography o Anti-virus software • You are the weakest link in computer security! o People are more vulnerable than computers • "The weakest link in the security chain is the human element" -Kevin Mitnick
  • 20. Ways to Prevent Social Engineering Training • User Awareness o User knows that giving out certain information is bad • Military requires Cyber Transportation to hold o Top Secret Security Clearance o Security Plus Certification • Policies o Employees are not allowed to divulge private information o Prevents employees from being socially pressured or tricked
  • 21. Ways to Prevent Social Engineering Cont.. • 3rd Party test - Ethical Hacker o Have a third party come to your company and attempted to hack into your network o 3rd party will attempt to glean information from employees using social engineering o Helps detect problems people have with security • Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about internal information • Do not provide personal information, information about the company(such as internal network) unless authority of person is verified
  • 22. General Saftey • Before transmitting personal information over the internet, check the connection is secure and check the url is correct • If unsure if an email message is legitimate, contact the person or company by another means to verify • Be paranoid and aware when interacting with anything that needs protected o The smallest information could compromise what you're protecting