Social Engineering

Social Engineering

Social engineering

Social Enginerring is the hack that requires no knowledge of code. Despite its relative simplicity the risks associated with social engineering are just as serious as the numerous hacks. Social engineering is the art of manipulating people into doing things, particularly security-related—such as giving away computer access or revealing confidential information.  Social engineers use psychological tricks on humans

Social Engineering
Social Engineering

Social Engineering is the tactic or trick of gaining  sensitive information by exploiting the basic human nature such as :
Trust
Fear
Desire

Social engineering is the hardest form of attack to defend against because it  cannot be defended with hardware or software alone.

Social Engineering
Social Engineering

“Rebecca” and “Jessica”
Hackers uses the term “Rebecca” and “Jessica” to denote social engineering attacks

“Rebecca” and “Jessica” mean a person who is an easy target for social engineering,
such as an receptionist of a company.

In many cases, these hackers use small pieces of information to gain trust or access so they can then carry out their cons fully. Here are a few examples:

  • A hacker might call saying your credit card has been flagged for unusual activity and the bank needs to verify your information (credit card number, mother’s maiden name, etc.) before issuing a replacement. He or she will offer up the last four digits of your card and perhaps the date and amount of a recent transaction (things easily found in your trash) to gain your confidence and make this sound legit.
  • Hackers might even pose as your Facebook friends or other social media connections and then glean information from your profile or your posts

Social Engineering can be  categoriesed as

  • Human Based

Gather sensitive information by interaction.

Attacks of this catogory expolits trust , fear and helping nature of human for eg .

  1. Calls as a technical support staff , and request id & passwords to retrive data.
  2. Survey a target company to collect information
  3. Refer to an important person in the organisation and try to collect data
  • Eavesdropping or unauthorised listening of conversation or reading messages

  • Shoulder surfing

Looking over your shoulder as you enter a password

Shoulder-Surfing
Shoulder Surfing
  • Dumpster Driving

Search for sensitive information at target company’s

  • Trash bin
  • Printer trash bin
  • User desk for sticky notes
Dumpster Driving
Dumpster Driving

 

Spam email

Email sent to many recipients without prior permission intended for commercial  purposes. Irrelevant , unwanted and unsolicited email to collect financial info. social security members, and network information

Phases in social Engineering Attack

Phases in social Engineering Attack
Phases in social Engineering Attack

Keep Visiting and Enjoy our session on how to start learn hacking

 

1 thought on “Social Engineering”

Comments are closed.