19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

68<br />

Part II: Putting Ethical Hacking in Motion<br />

You can use the information in this chapter to perform specific tests or improve<br />

information security awareness in your organization. Social engineering can<br />

harm people’s jobs and reputations, and confidential information could be<br />

leaked. Proceed with caution, and think before you act.<br />

You can perform social engineering attacks in millions of ways. From walking<br />

through the front door purporting to be someone you’re not to launching an<br />

all-out phishing campaign using a tool such as the Simple Phishing Toolkit<br />

(www.sptoolkit.com), the world is your oyster. For this reason, and<br />

because training specific behaviors in a single chapter is next to impossible, I<br />

don’t provide how-to instructions for carrying out social engineering attacks.<br />

Instead, I describe specific social engineering scenarios that have worked for<br />

other hackers — both ethical and unethical. You can tailor these same tricks<br />

and techniques to your specific situation.<br />

An outsider to the organization might perform these social engineering techniques<br />

best. If you perform these tests against your organization, acting as<br />

an outsider might be difficult if everyone knows you. This risk of recognition<br />

might not be a problem in larger organizations, but if you have a small, closeknit<br />

company, people might catch on to your antics.<br />

You can outsource social engineering testing to a trusted consulting firm or<br />

even have a trusted colleague perform the tests for you. The key word here<br />

is trusted. If you involve someone else, you must get references, perform<br />

background checks, and have the testing approved by management in writing<br />

beforehand. I cover the topic of outsourcing security and ethical hacking in<br />

Chapter 18.<br />

Why Attackers Use Social Engineering<br />

Many bad guys use social engineering to break into systems because it’s often<br />

the simplest way for them to get what they’re looking for. They want someone<br />

to open the door to the organization so that they don’t have to break in and<br />

risk being caught. Security technologies such as firewalls, access controls, and<br />

authentication devices won’t stop a determined social engineer.<br />

Most social engineers perform their attacks slowly to avoid suspicion. Social<br />

engineers gather bits of information over time and use the information to create<br />

a broader picture of the organization they’re trying to manipulate. Alternatively,<br />

some social engineering attacks can be performed with a quick phone call or<br />

e-mail. The methods used depend on the attacker’s style and abilities.<br />

Social engineers know that many organizations don’t have formal data classification<br />

programs, access control systems, incident response plans, or security<br />

awareness programs, and they take advantage of these weaknesses.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!