SlideShare a Scribd company logo
2
Most read
6
Most read
12
Most read
Social Engineering (Because there is no patch for human stupidity)By: Shobhit GautamTwitter @sh0bhit105
What Is Social Engineering?The art of manipulating people and getting them to do what you want.“Social Engineering - A euphemism for non-technical or low-technology means - such as lies, impersonation, tricks, bribes, blackmail, and threat - used to attack information systems.” "Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick.
Common Types of Social EngineeringHuman-basedComputer-based
Personality TraitsDiffusion of responsibilityChance for ingratiationTrust relationshipMoral dutyGuiltIdentificationDesire to be HelpfulCooperation
Techniques for persuasionA Direct Route	Systematic and logical statementA Peripheral Route	Beat around the Bush	Trigger strong emotions such as fear and excitement.
Human Based methodsImpersonating IntimidationCreating confusionMay I help you?Can you help me?Building TrustAsk and It shall be given unto you seek and ye shall find.Dumpster Diving
Computer BasedPopup WindowsMail attachmentsSpam, Chain Letters and HoaxesPhishing WebsitesUSB devices Key loggers
Social Engineering Toolkit The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing.SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset.  It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
Social Engineering
./set
How to Identify A Social Engineer?Does not provide contact informationAlways asks for forbidden informationRushing Activities Name-droppingIntimidationObserve for Small mistakes
MitigationShreddersPolicies and ProceduresAwarenessUpdated patches and Anti Viruses/Malwares
NOW

More Related Content

PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Social engineering
PDF
Social engineering
PDF
Social Engineering Basics
PDF
Social Engineering Attacks & Principles
PPTX
Social Engineering,social engeineering techniques,social engineering protecti...
PPTX
Social engineering hacking attack
PPTX
Social Engineering
Presentation of Social Engineering - The Art of Human Hacking
Social engineering
Social engineering
Social Engineering Basics
Social Engineering Attacks & Principles
Social Engineering,social engeineering techniques,social engineering protecti...
Social engineering hacking attack
Social Engineering

What's hot (20)

PDF
Social engineering
PPTX
Social engineering
PPTX
Social engineering
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Social engineering
PPTX
Hyphenet Security Awareness Training
PDF
Cyber Security Awareness
PPTX
What is Phishing and How can you Avoid it?
PPTX
Social engineering presentation
PPTX
Phising a Threat to Network Security
PPTX
Phishing ppt
PDF
What is Social Engineering? An illustrated presentation.
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Information Security Awareness Training Open
PPT
Social Engineering | #ARMSec2015
PPTX
PHISHING attack
PDF
Security Awareness Training
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Phishing attack
PPTX
Social engineering
Social engineering
Social engineering
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Social engineering
Hyphenet Security Awareness Training
Cyber Security Awareness
What is Phishing and How can you Avoid it?
Social engineering presentation
Phising a Threat to Network Security
Phishing ppt
What is Social Engineering? An illustrated presentation.
Social engineering-Attack of the Human Behavior
Information Security Awareness Training Open
Social Engineering | #ARMSec2015
PHISHING attack
Security Awareness Training
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Phishing attack
Ad

Similar to Social Engineering (20)

PDF
Social Engineering Basics
PDF
Presentation_Social_Engineering.pdf
PDF
Unlocking the Hidden Potential
PDF
Social engineering(nulldubai)
PDF
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
PDF
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
PPT
VAPTdelivery7.ppt
PPTX
Social Engineering Attacks How Hackers Exploit Human Psychology.pptx
PDF
- Social Engineering Unit- II Part- I.pdf
PPT
Module 3 social engineering-b
PPTX
Conference about Social Engineering (by Wh0s)
PPTX
Cybersecurity Social Engineering Tactics & Mitigation Strategies
PPTX
Social Engineering
PPTX
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
PDF
Insiders Guide to Social Engineering - End-Users are the Weakest Link
PPTX
The Art of Human Hacking : Social Engineering
PDF
What is Social Engineering
PPTX
What is social engineering & why it is important
PPTX
btNOG 9 Keynote Speech on Evolution of Social Engineering
DOCX
ITE516 A3
Social Engineering Basics
Presentation_Social_Engineering.pdf
Unlocking the Hidden Potential
Social engineering(nulldubai)
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
VAPTdelivery7.ppt
Social Engineering Attacks How Hackers Exploit Human Psychology.pptx
- Social Engineering Unit- II Part- I.pdf
Module 3 social engineering-b
Conference about Social Engineering (by Wh0s)
Cybersecurity Social Engineering Tactics & Mitigation Strategies
Social Engineering
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Insiders Guide to Social Engineering - End-Users are the Weakest Link
The Art of Human Hacking : Social Engineering
What is Social Engineering
What is social engineering & why it is important
btNOG 9 Keynote Speech on Evolution of Social Engineering
ITE516 A3
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Social Engineering

  • 1. Social Engineering (Because there is no patch for human stupidity)By: Shobhit GautamTwitter @sh0bhit105
  • 2. What Is Social Engineering?The art of manipulating people and getting them to do what you want.“Social Engineering - A euphemism for non-technical or low-technology means - such as lies, impersonation, tricks, bribes, blackmail, and threat - used to attack information systems.” "Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick.
  • 3. Common Types of Social EngineeringHuman-basedComputer-based
  • 4. Personality TraitsDiffusion of responsibilityChance for ingratiationTrust relationshipMoral dutyGuiltIdentificationDesire to be HelpfulCooperation
  • 5. Techniques for persuasionA Direct Route Systematic and logical statementA Peripheral Route Beat around the Bush Trigger strong emotions such as fear and excitement.
  • 6. Human Based methodsImpersonating IntimidationCreating confusionMay I help you?Can you help me?Building TrustAsk and It shall be given unto you seek and ye shall find.Dumpster Diving
  • 7. Computer BasedPopup WindowsMail attachmentsSpam, Chain Letters and HoaxesPhishing WebsitesUSB devices Key loggers
  • 8. Social Engineering Toolkit The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing.SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
  • 10. ./set
  • 11. How to Identify A Social Engineer?Does not provide contact informationAlways asks for forbidden informationRushing Activities Name-droppingIntimidationObserve for Small mistakes
  • 13. NOW