CompTIA Security Plus - Chapter 1: Social Engineering Techniques

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Whales

High-value targets

Familiarity

People do things for people they like or feel connected to. Attackers appeal to others which can lead to mislead trust

Smishing attack begins with...

SMS message - Link to URL that serves up a variety of attack vectors (malware)

Watering Hole Attack (complex)

A malicious attack that is directed toward a small group of specific individuals who visit the same website. involves the infecting of a target website with malware

consensus

a group-wide decisio

Typosquatting

an attack form that involves capitalizing upon common typographical errors - URL hijacking, fake URL, or brandjacking if the objective is to deceive based on branding.

Smishing

an attack using Short Message Service (SMS) on victims' cell phones. It is a version of phishing via SMS

Trust

as having an understanding of how something will act under specific conditions

Spam

bulk unsolicited e-mail

How can a social engineer elicit information?

by convincing people, whose main job is to help others, to perform tasks resulting in security compromises.

How can attacker utilize the consensus?

by manipulating them to achieve desired outcomes.

The pretext_____have to be true...

does not it only needs to be believable and relevant in convincing the victim to give help. -deception and false motives to manipulate the victim

The purpose of hostile SPIM...

getting an unsuspecting user to click malicious content or links, thus initiating the attack.

Using phishing, attackers target... by sending out e-mails. To become a victim, the recipient must take an action (for example, respond by providing personal information).

individuals

Pharming

misdirecting users to fake websites made to look official

In most locations, trash is... private property after it has been discarded

no longer considered (and even where dumpster diving is illegal, little enforcement occurs).

Identity fraud can also happen where?

online as well, using known information about the person you are impersonating

The effectiveness of social engineering attacks is...

technical and part psychological

Spear Phishing Ratio

the # of responses received (successful attacks) : the total number of e-mails or messages sent usually increases because a targeted attack will seem more plausible than a message sent to users randomly

Prepending

the act of adding something else to the beginning of an item - the act of supplying information that another will act upon, frequently before they ask for it, in an attempt to legitimize the actual request, which comes later.

Pretexting

the attacker uses a narrative (the pretext) to influence the victim into giving up some item of information.

How are influence campaigns effective?

the bandwagon effect, where when one leads, many follow, typically without critically examining the premise they are then following. (previously called propaganda)

hybrid warfare

the information is used to sway people toward a position favored by those spreading it.

Influence campaigns

the use of collected information and selective publication of material to key individuals in an attempt to alter perceptions and change people's minds on a topic.

Examples of Defense against identity fraud

- All packages must be dropped at the security desk - all visitors who need access must be escorted - disclosure policies, like resetting passwords or giving a party access.

In pharming, the user will be directed to the fake website as a result of activity such as... (Two ways)

- DNS poisoning: (an attack that changes URLs in a server's domain name table) - Modification of local host files: (which are used to convert URLs to the appropriate IP address).

Examples of Online Attacks

- Impersonation - Popup Windows - Phishing (email + social media)

What can employees do to prevent social engineering attacks?

- Maintaining vigilance - employee training - frequent reminders, retraining, and notification of violations - public awareness campaigns

A countermeasure against piggybacking

- Mantrap, which utilizes two doors to gain access to the facility.

Examples of eliciting info

- Posing as an employee, an attacker can get a password reset, information about some system, or other useful information - Posing as the help desk or tech support person. Then, by calling employees, the attacker can get information on system status and other interesting elements that they can use later.

SPIM

- SPAM OVER INSTANT MESSAGING - variation of Spam

Organization Policies about discarding materials

- Sensitive information should be shredded - should consider securing the trash receptacle so that individuals can't forage through it. Get a SHEDDER

What is common method used against whales and WHY?

- Spear phishing - The communication is designed to appear to be ordinary business for the target, being crafted to appear nonsuspicious.

Ways to fight against piggybacking and shoulder surfing

- Training employees simple procedures to ensure nobody follows them too closely or is in the position to observe their actions.

How do Invoice scams function?

- Urgency - Final Notice - Threatening to report the organization to a collection agency

Spam use... (malicious - two)

- an attachment that contains malicious software designed to harm your system - a link to a malicious website that may attempt to obtain personal information from you

How do Social engineers use trust?

- by shaping the perceptions of a target to where they will apply judgments to the trust equation and come to false conclusions (not forcefully but guide)

Spam use... (legitimate)

- company advertising a product or service

The best defense against social engineering attacks is a ... training should... but doing so in an environment where trust is...

- comprehensive training and awareness program - emphasize the value of being helpful and working as a team - verified and is a ritual

Shoulder surfing

- does not necessarily involve direct contact with the target; instead, the attacker directly observes the individual entering sensitive information on a form, keypad, or keyboard.

Tailgating (or piggybacking) exploits people who are... (three ways)

- in a hurry - who is not following security procedures - uses the sense of familiarity

Examples of Shoulder Surfing

- look over the shoulder of the user at work - may set up a camera or use binoculars to view the user entering sensitive data.

Vishing Attack

- may send an email to ask to call a number/ or receive a recorded message - spoof (simulate) calls from legitimate entities using Voice over IP (VoIP) technology - gain sensitive info - used in identity theft

How to prevent/stop social engineering techniques?

- policies and procedure - verification - Visitor access - rules before assisting a customer -have multiple layers of defenses, including approvals and related safeguards - a healthy dose of knowledge

Defense against all cases of impersonation

- require employees to ask to see a person's ID before engaging - Training and awareness -to conduct training on a regular basis and to tailor it to what is currently being experienced, rather than a generic recitation of best practices.

Influence campaigns are even more powerful when used in conjunction with.... to spread influence through influencer propagation which acts as an...

- social media -amplifying mechanism

Example of prepending

- stating that they were sent by the target's boss, or another authority figure, as a means to justify why the target should perform a specific action—typically one that, in the absence of the prepending, would not be normal.

Shoulder Surfing attackers may attempt to...

- to obtain information such as a personal identification number (PIN) at an automated teller machine (ATM) - an access control entry code at a secure gate or door, or a calling card or credit card number

Time can be manipulated to drive a sense of... and prompt shortcuts that can lead to opportunities for interjection into processes.

- urgency (Perception is the key)

Protection against Shoulder Surfers (two)

- use a privacy screen or filter to surround a keypad so that it is difficult to observe somebody as they enter information. - More sophisticated systems can actually scramble the location of the numbers so that the top row at one time includes the numbers 1, 2, and 3 and the next time includes 4, 8, and 0.

During a Phishing Attack, The attacker attempts to obtain information such as...

- usernames - passwords - credit card numbers - details about the users' bank accounts

Vishing

- uses voice communication technology to obtain the information the attacker is seeking

Examples of Reconnaissance: (to obtain information that goes into a description of the system that will be under attack)

- victim's google searches, public record searches -surveying a company's org charts - calling and asking for people's contact information and building a personnel directory - asking questions about hardware and software via surveys, and reading press releases (Known weaknesses against specific products can be employed and are easier to find if the attacker knows what products the company is using)

Social engineering is very successful for two general reasons

-1. Basic desire of most people to be helpful (either directly in an attack or indirectly to build a bigger picture that an attacker can use to create an aura of authenticity during an attack) 2. Individuals normally seek to avoid confrontation and trouble (concepts of authority, intimidation, consensus, scarcity, familiarity, trust, and urgency)

Examples of Impersonation

-third parties - help desk operators - vendors - online sources.

Methods - Social Engineering

1. The Sense of Familiarity - making it seems as if you belong to group 2. Involves creating a hostile situation - sympathy 3. Body language

Social Engineering

1. an attack against a user, and typically some form of social interaction 2. involves manipulating the very social nature of interpersonal relationships - preys on several characteristics we tend to desire

What is a way to combat attacks designed to get user's credentials?

Two-factor authorization

How to combat Hoaxes

Users should be trained to be suspicious of unusual e-mails and stories and should know who to contact in the organization to verify their validity if they are received. -"spread the word" ':7

Third-Party Authorization

Using the name of a trusted third person, usually someone in authority, to add credibility to the social engineering attempt

During a vishing attack,... can also be compromised and used in these attempts.

Voice messaging (to establish a form of trust that can be exploited over the phone)

Invoice Scams

a fake invoice in an attempt to get a company to pay for things it has not ordered.

Phishing

An attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an e-mail or instant message sent to a large group of often random users

Whaling

an attack where the target is a high-value person, such as a CEO or CFO

Contractors/Outside Parties

an attacker can simply put on clothing that matches a contractor's uniform, show up to do the job at a slightly different time than it's usually done, and, if challenged, play on the sympathy of the workers by saying they are filling in for X or covering for Y.

The use of authority in social situations can lead to...

an environment where one party feels at risk in challenging another over an issue.

Social engineers will employ strategies aimed at...

at exploiting people's own biases and beliefs in a manner to momentarily deny them the service of good judgment and the use of standard procedures.

The fake site will... (typosquatting)

collects credentials, passing them on to the real site, and then steps out of the conversation to avoid detection once the credentials are obtained

The phishing target could be a... and access to the information found on it, or it could be personal information, generally financial, about an individual.

computer system

Spear phishing

created to refer to a phishing attack that targets a specific person or group of people with something in common

Intimidation

creates an air of authority around one's persona. (can be either subtle, through perceived power, or more direct, through the use of communications that build an expectation of superiority)

Credential Harvesting (highly successful)

involves the collection of credential information, such as user IDs, passwords, and so on, enabling an attacker a series of access passes to the system

Vishing takes advantage of the... that some people place in the telephone network.

trust

Smishing attacks gives out the sense of...

urgency and intimidation in the message, which might use a warning

identity fraud

use of fake credentials to achieve an end

Defense against identity fraud is...

use strong policies and procedures without exceptions

Typosquatting can also be used to do what?

used to plant drive-by malware on the victim machine. It can move the packets through an affiliate network, earning click-through revenue based on the typos.

Eliciting Information

Calls to or from help desk and tech support units

Key Example of Identity Fraud

TSA security

Impersonation

The attacker assumes a role that is recognized by the person being attacked, and in assuming that role, the attacker uses the potential victim's biases against their better judgment to follow procedures.

Dumpster Diving

The process of going through a target's trash in hopes of finding valuable information that might be used in a penetration attempt (common place)

Another way of identifying the user and a limited time limit

The second factor verification

Tailgating (or piggybacking)

The simple tactic of following closely behind a person who has just used their own access card or PIN to gain physical access to a room or building.

Hoax

can be very damaging if it causes users to take some sort of action that weakens security.

Phishing Attack

Attacker sends a bulk e-mail Message (saying that account was compromised, ex. bank) - Website (verification)- Supply Sensitive Info - Attack

The tools in a social engineer's toolbox are based on...

a knowledge of psychology and don't necessarily require a sophisticated knowledge of software or hardware.

Reconnaissance (most accepted as inevitable)

a military term used to describe the actions of surveying a battlefield to gain information prior to hostilities. - plan where to attack gaining an understanding of the victim: sometimes directly manipulating people to gain information google searches, public record searches

Since credential harvesting is so successful, what must financial firms do now?

a normal user ID and password with a second-factor, out-of-band inquiry to prevent subsequent use of harvested credentials.

A defense against attackers who impersonate the use of authority is...

a strong set of policies that has no exceptions.

A pretext attack can occur in...

person, by email, over the phone, or virtually any other form of communication.

What is the common way for credential harvesting to start?

phishing e-mail that convinces a user to click a link and, in response, brings up a replica of their bank's web page.

Whaling attacks are not performed by attacking multiple targets and rather are...

rather are custom built to increase the odds of success (group = limited, so an attacker cannot rely upon random returns from a wide population of targets)

The message that is sent often encourages the user to go to a website that appears to be for a... such as PayPal or eBay, both of which have frequently been used in phishing attempts.

reputable entity (masquerading)

Scarcity

short supply implied scarcity, or implied future change in availability, can create a perception of scarcity = fear

- Users are unaware that attackers can... using Voice over IP (VoIP) technology

spoof (simulate) calls from legitimate entities


Set pelajaran terkait

1.1 inductive & deductive reasoning

View Set

shay's rebellion cause and effect

View Set

Chapter 1 - Introduction to Computers, the Internet, and Visual C#

View Set

HRM Chapter 2- Strategic HR Management and Planning

View Set

ARTS MANAGEMENT FINAL EXAM NOTES

View Set

BSAD 150 Essay Questions (lists to memorize for final exam)

View Set