SlideShare a Scribd company logo
Social Engineering
The Art of Human Hacking
www.facebook.com/realexninja
โ‚ฌ24bn
processed annually
12,000clients
3 offices:
London. Dublin. Paris.
170employees
Social Engineering: Content
โ€ข Content:
โ€“ What is social engineering?
โ€“ Types of social engineering & new age threats
โ€“ How to use Facebook to ruin someoneโ€™s life
โ€“ Countermeasures
โ€“ Q&A
Social Engineering: Intro
Which city is on the picture?
Social Engineering: Intro
Firewalls
Social Engineering: Intro
โ€ข Victims of social engineering
โ€“ RSA
โ€ข Infected Excel attachment, over $100 million of damage
โ€“ Well Fargo Bank
โ€ข โ€œCatholic Healthcareโ€ phone call, $2.1 million vanished
โ€“ Vodafone Help Desk
โ€ข Malware and fraud call, end user lost everything
Social Engineering: Intro
Social Engineering: Basics to Succeed
โ€ข What is social engineering?
The attempt to control social behaviour.
โ€“ The 3 Critical Success Factors:
โ€ข trust
โ€ข satisfaction
โ€ข relationship
Social Engineering: Basics to Succeed
Social Engineering: Basics to Succeed
โ€ข The first โ€œtouchโ€ with social engineering
Happy
mom
Happy
child
Social Engineering: Basics to Succeed
Good Evil
Social Engineering: Types
โ€ข Old-Fashioned Types of Social Engineering Techniques:
โ€“ Direct approach
โ€“ Important user
โ€“ Helpless user
โ€“ Technical support
โ€“ Mail-outs
โ€“ Social media - Facebook
Social Engineering: Types
โ€ข 1. Direct approach โ€ข 2. Important user
Social Engineering: Types
โ€ข 3. Helpless user โ€ข 4. Technical support
Social Engineering: Types
โ€ข 6. Social mediaโ€ข 5. Mail-outs
Social Engineering: Types
โ€ข New-Fashioned Types of Social Engineering Techniques:
โ€“ 1. Phishing with new lethal-strains of ransomware
Social Engineering: Types
โ€ข New-Fashioned Types of Social Engineering Techniques:
โ€“ 2. IVR and robocalls for credit card information
Did you purchase a flat screen TV for
$3,295? Press 1 for yes or 2 for no.
Social Engineering: Types
โ€ข New-Fashioned Types of Social Engineering Techniques:
โ€“ 3. Phishing with funerals
Social Engineering: Practical example
How to use Facebook to ruin someoneโ€™s life
(attack on an employee)
Social Engineering: Practical example
โ€ข 1st step: Protect your identity
โ€“ Install new operation system on a new disk
โ€“ Encrypt your disk
โ€“ Use anonymous proxy
โ€“ Use free Wi-Fi in a bar
โ€“ Preform attack drinking cold beer
Social Engineering: Practical example
โ€ข 2nd step: Fake e-mail and Facebook account
โ€“ The character must be:
โ€ข Woman*
โ€ข 25 to 35 years old
โ€ข Single
โ€ข High educated
โ€ข Interesting
* Statistically is proven that the success rate using a woman character
is more than 100 times (!) higher then using a male profile.
Social Engineering: Practical example
โ€ข 3rd step: Select the victim(s)
โ€“ Before sending the invitation:
โ€ข Get him/her friends
โ€ข Get him/her interests
Social Engineering: Practical example
โ€ข 4th step: Get the victim(s) as friend
โ€“ Start chatting and get sensitive information
โ€“ Start chat and get โ€œsensitiveโ€ photos
โ€“ Post link to an infected site
โ€“ โ€ฆ
Social Engineering: How to spot
โ€ข How to spot Social Engineering attack?
โ€“ unusual requirements
โ€“ requiring respect for authority
โ€“ threating with negative consequences
โ€“ giving praise and flattery
โ€“ offering something for nothing
โ€“ seems too good to be true, etcโ€ฆ
Social Engineering: Countermeasure
โ€ข Social Engineering Countermeasure
โ€“ Slow down and Research the facts
โ€“ Delete any request for financial information or passwords.
โ€“ Reject requests for help or offers of help
โ€“ Donโ€™t let a link in control of where you land
โ€“ Do not post yours personal data or photos
โ€“ Do not reveal sensitive data (e.g. passwords)
โ€“ Do not avoid policies and procedures
โ€“ Report any suspicious activity
Social Engineering: Last Slideโ€ฆ Promise!
โ€ข Questions and discussion
โ€œThere is no such thing as a stupid question, only stupid answersโ€œ: Colin Powell
www.facebook.com/realexninja
Social Engineering: The end
Thank you!

More Related Content

PPTX
PPTX
Social Engineering
PPTX
Social engineering presentation
PPTX
Social Engineering new.pptx
PPSX
Social Engineering - Are You Protecting Your Data Enough?
PPTX
Social engineering
PPTX
Cyber security
ย 
PPTX
Social engineering hacking attack
Social Engineering
Social engineering presentation
Social Engineering new.pptx
Social Engineering - Are You Protecting Your Data Enough?
Social engineering
Cyber security
ย 
Social engineering hacking attack

What's hot (20)

PPTX
Social engineering
PDF
Social engineering
PPTX
Social engineering
PPTX
Social Engineering - Human aspects of industrial and economic espionage
PDF
Social engineering
PDF
Social engineering attacks
PDF
Social Engineering Attacks & Principles
PPTX
Social Engineering,social engeineering techniques,social engineering protecti...
PPTX
Social engineering-Attack of the Human Behavior
PPTX
The Art of Human Hacking : Social Engineering
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PDF
Social Engineering Basics
PPTX
Social Engineering
PPT
Social Engineering | #ARMSec2015
PDF
What is Social Engineering? An illustrated presentation.
ย 
PDF
Red Team Framework
PPTX
SOC: Use cases and are we asking the right questions?
PPT
Employee Security Training[1]@
ย 
PPTX
Social engineering
PDF
Social engineering
Social engineering
Social engineering
Social Engineering - Human aspects of industrial and economic espionage
Social engineering
Social engineering attacks
Social Engineering Attacks & Principles
Social Engineering,social engeineering techniques,social engineering protecti...
Social engineering-Attack of the Human Behavior
The Art of Human Hacking : Social Engineering
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Social Engineering Basics
Social Engineering
Social Engineering | #ARMSec2015
What is Social Engineering? An illustrated presentation.
ย 
Red Team Framework
SOC: Use cases and are we asking the right questions?
Employee Security Training[1]@
ย 
Social engineering

Viewers also liked (18)

PPTX
Social engineering
PDF
Social Engineering - Strategy, Tactics, & Case Studies
PDF
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
PPTX
social engineering
PDF
Social Engineering, or hacking people
PPT
Social engineering for security attacks
PDF
Social Engineering: the Bad, Better, and Best Incident Response Plans
PPTX
Hacker tooltalk: Social Engineering Toolkit (SET)
PDF
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
PPT
Social Engineering
PPT
Module 3 social engineering-b
ย 
PPTX
Kevin Mitnick
PPTX
Kevin mitnick
PPTX
Social Engineering and What to do About it
PPTX
Cos 432 web_security
PPTX
Web application security
PPT
Web security
PPT
Social Engineering: "The Cyber-Con"
Social engineering
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
social engineering
Social Engineering, or hacking people
Social engineering for security attacks
Social Engineering: the Bad, Better, and Best Incident Response Plans
Hacker tooltalk: Social Engineering Toolkit (SET)
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Social Engineering
Module 3 social engineering-b
ย 
Kevin Mitnick
Kevin mitnick
Social Engineering and What to do About it
Cos 432 web_security
Web application security
Web security
Social Engineering: "The Cyber-Con"

Similar to Presentation of Social Engineering - The Art of Human Hacking (20)

PDF
Ceh v5 module 09 social engineering
PDF
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
PDF
Social Engineering - By Chris Hills
PPTX
Social engineering The Good and Bad
PPTX
MHTA Social Engineering Presentation - 050917
PDF
- Social Engineering Unit- II Part- I.pdf
PPTX
Shannon Morris PDLM presentation
PPTX
protecting your digital personal life
PPTX
Reconnaissance and Social Engineering
PPTX
Introduction to ethics
PPTX
Social Engineering
PDF
Module 9 (social engineering)
PPTX
Hacker risks presentation to ACFE PR Chapter
PPTX
Faculty presentation 21 st december 2015
PPTX
Introduction to Cybersecurity - Secondary School_0.pptx
PDF
LinkedIn to Your Network - The Social Engineering Threat
PPTX
Conference about Social Engineering (by Wh0s)
PPTX
NENA 2017 Doxing and Social Engineering
PPTX
Ethical Issues in Technology is essential
PPTX
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
Ceh v5 module 09 social engineering
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Social Engineering - By Chris Hills
Social engineering The Good and Bad
MHTA Social Engineering Presentation - 050917
- Social Engineering Unit- II Part- I.pdf
Shannon Morris PDLM presentation
protecting your digital personal life
Reconnaissance and Social Engineering
Introduction to ethics
Social Engineering
Module 9 (social engineering)
Hacker risks presentation to ACFE PR Chapter
Faculty presentation 21 st december 2015
Introduction to Cybersecurity - Secondary School_0.pptx
LinkedIn to Your Network - The Social Engineering Threat
Conference about Social Engineering (by Wh0s)
NENA 2017 Doxing and Social Engineering
Ethical Issues in Technology is essential
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx

Recently uploaded (20)

PDF
Instant Audience, Long-Term Impact Buy Real Telegram Members
PDF
Subscribe This Channel Subscribe Back You
PDF
11111111111111111111111111111111111111111111111
PPTX
Result-Driven Social Media Marketing Services | Boost ROI
PPTX
Preposition and Asking and Responding Suggestion.pptx
PDF
The Edge Youโ€™ve Been Missing Get the Sociocosmos Edge
PDF
Create. Post. Dominate. Let's Build Together
PPTX
Table Top Exercise (TTEx) on Emergency.pptx
PPTX
Developing lesson plan gejegkavbw gagsgf
PDF
Medium @mikehydes The Cryptomaster Audience Stats
PDF
COMMENTIFY - Commentify.co: Your AI LinkedIn Comments Agent
PDF
The Fastest Way to Look Popular Buy Reactions Today
PDF
Medium @mikehydes The Cryptomaster Story Stats
PDF
Presence That Pays Off Activate My Social Growth
PDF
Your Best Post Vanished. Blame the Attention Economy
PDF
Medium @mikehydes The Cryptomaster About page
PPTX
Office Administration Courses in Trivandrum That Employers Value.pptx
PDF
StarNetCafeSB2012D3POYNagaworld2-Hotel-Casino-Phnom Entertainment
PDF
Medium @mikehydes The Cryptomaster Home page
PDF
How can India improve its Public Diplomacy - Social Media.pdf
Instant Audience, Long-Term Impact Buy Real Telegram Members
Subscribe This Channel Subscribe Back You
11111111111111111111111111111111111111111111111
Result-Driven Social Media Marketing Services | Boost ROI
Preposition and Asking and Responding Suggestion.pptx
The Edge Youโ€™ve Been Missing Get the Sociocosmos Edge
Create. Post. Dominate. Let's Build Together
Table Top Exercise (TTEx) on Emergency.pptx
Developing lesson plan gejegkavbw gagsgf
Medium @mikehydes The Cryptomaster Audience Stats
COMMENTIFY - Commentify.co: Your AI LinkedIn Comments Agent
The Fastest Way to Look Popular Buy Reactions Today
Medium @mikehydes The Cryptomaster Story Stats
Presence That Pays Off Activate My Social Growth
Your Best Post Vanished. Blame the Attention Economy
Medium @mikehydes The Cryptomaster About page
Office Administration Courses in Trivandrum That Employers Value.pptx
StarNetCafeSB2012D3POYNagaworld2-Hotel-Casino-Phnom Entertainment
Medium @mikehydes The Cryptomaster Home page
How can India improve its Public Diplomacy - Social Media.pdf

Presentation of Social Engineering - The Art of Human Hacking

  • 1. Social Engineering The Art of Human Hacking www.facebook.com/realexninja
  • 3. Social Engineering: Content โ€ข Content: โ€“ What is social engineering? โ€“ Types of social engineering & new age threats โ€“ How to use Facebook to ruin someoneโ€™s life โ€“ Countermeasures โ€“ Q&A
  • 4. Social Engineering: Intro Which city is on the picture?
  • 6. Social Engineering: Intro โ€ข Victims of social engineering โ€“ RSA โ€ข Infected Excel attachment, over $100 million of damage โ€“ Well Fargo Bank โ€ข โ€œCatholic Healthcareโ€ phone call, $2.1 million vanished โ€“ Vodafone Help Desk โ€ข Malware and fraud call, end user lost everything
  • 8. Social Engineering: Basics to Succeed โ€ข What is social engineering? The attempt to control social behaviour. โ€“ The 3 Critical Success Factors: โ€ข trust โ€ข satisfaction โ€ข relationship
  • 10. Social Engineering: Basics to Succeed โ€ข The first โ€œtouchโ€ with social engineering Happy mom Happy child
  • 11. Social Engineering: Basics to Succeed Good Evil
  • 12. Social Engineering: Types โ€ข Old-Fashioned Types of Social Engineering Techniques: โ€“ Direct approach โ€“ Important user โ€“ Helpless user โ€“ Technical support โ€“ Mail-outs โ€“ Social media - Facebook
  • 13. Social Engineering: Types โ€ข 1. Direct approach โ€ข 2. Important user
  • 14. Social Engineering: Types โ€ข 3. Helpless user โ€ข 4. Technical support
  • 15. Social Engineering: Types โ€ข 6. Social mediaโ€ข 5. Mail-outs
  • 16. Social Engineering: Types โ€ข New-Fashioned Types of Social Engineering Techniques: โ€“ 1. Phishing with new lethal-strains of ransomware
  • 17. Social Engineering: Types โ€ข New-Fashioned Types of Social Engineering Techniques: โ€“ 2. IVR and robocalls for credit card information Did you purchase a flat screen TV for $3,295? Press 1 for yes or 2 for no.
  • 18. Social Engineering: Types โ€ข New-Fashioned Types of Social Engineering Techniques: โ€“ 3. Phishing with funerals
  • 19. Social Engineering: Practical example How to use Facebook to ruin someoneโ€™s life (attack on an employee)
  • 20. Social Engineering: Practical example โ€ข 1st step: Protect your identity โ€“ Install new operation system on a new disk โ€“ Encrypt your disk โ€“ Use anonymous proxy โ€“ Use free Wi-Fi in a bar โ€“ Preform attack drinking cold beer
  • 21. Social Engineering: Practical example โ€ข 2nd step: Fake e-mail and Facebook account โ€“ The character must be: โ€ข Woman* โ€ข 25 to 35 years old โ€ข Single โ€ข High educated โ€ข Interesting * Statistically is proven that the success rate using a woman character is more than 100 times (!) higher then using a male profile.
  • 22. Social Engineering: Practical example โ€ข 3rd step: Select the victim(s) โ€“ Before sending the invitation: โ€ข Get him/her friends โ€ข Get him/her interests
  • 23. Social Engineering: Practical example โ€ข 4th step: Get the victim(s) as friend โ€“ Start chatting and get sensitive information โ€“ Start chat and get โ€œsensitiveโ€ photos โ€“ Post link to an infected site โ€“ โ€ฆ
  • 24. Social Engineering: How to spot โ€ข How to spot Social Engineering attack? โ€“ unusual requirements โ€“ requiring respect for authority โ€“ threating with negative consequences โ€“ giving praise and flattery โ€“ offering something for nothing โ€“ seems too good to be true, etcโ€ฆ
  • 25. Social Engineering: Countermeasure โ€ข Social Engineering Countermeasure โ€“ Slow down and Research the facts โ€“ Delete any request for financial information or passwords. โ€“ Reject requests for help or offers of help โ€“ Donโ€™t let a link in control of where you land โ€“ Do not post yours personal data or photos โ€“ Do not reveal sensitive data (e.g. passwords) โ€“ Do not avoid policies and procedures โ€“ Report any suspicious activity
  • 26. Social Engineering: Last Slideโ€ฆ Promise! โ€ข Questions and discussion โ€œThere is no such thing as a stupid question, only stupid answersโ€œ: Colin Powell www.facebook.com/realexninja
  • 27. Social Engineering: The end Thank you!

Editor's Notes

  • #3: Company HistoryFounded in 2000 โ€“ Founder Colm Lyon remains our CEO โ€“ still heavily involved.Key Focus on connecting CNP multi-channel merchants to banksPayment solutions,
  • #5: You probably remember the story of the Trojan War, because this war was one of the most important events in Greek mythology. You probably also remember that Achaean (ARKIJN) troops besieged the city of Troy for ten years without any results and a lot of soldiers died in vain. Because the raw Attack on Trojans technology or walls did not work, the army of Achaean decided to attack the Trojans mind. And then the city fell to the ruse of the Trojan Horse made by wood in just one day. Why the wooden trick was so efficient? Because of usage of the power of social engineering.
  • #7: An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West's bank account."The brazen theft was pulled off ingeniously, but the biggest responsibility for its successful realization seems to lay with the Wells Fargo escrow agent who authorized the transfer without thoroughly checking on the legitimacy of the requests," writes Help Net Security's ZeljkaZorz."Armed with the name of the bank where Catholic Healthcare West had the account and the name and signature of the chain's CFO, the fraudster put the plan in motion in December 2011, Forbes reports," Zorz writes.
  • #8: An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West's bank account."The brazen theft was pulled off ingeniously, but the biggest responsibility for its successful realization seems to lay with the Wells Fargo escrow agent who authorized the transfer without thoroughly checking on the legitimacy of the requests," writes Help Net Security's ZeljkaZorz."Armed with the name of the bank where Catholic Healthcare West had the account and the name and signature of the chain's CFO, the fraudster put the plan in motion in December 2011, Forbes reports," Zorz writes.
  • #17: CryptoDefense