19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

70<br />

Part II: Putting Ethical Hacking in Motion<br />

exist, recovery and protection are difficult after the attack. Furthermore, the<br />

hard, crunchy outside of firewalls and intrusion prevention systems often creates<br />

a false sense of security, making the problem even worse.<br />

With social engineering, you never know the next method of attack. The best<br />

things you can do are to remain vigilant, understand the social engineer’s<br />

methodology, and protect against the most common attacks through ongoing<br />

security awareness in your organization. I discuss how you can do this in the<br />

rest of this chapter.<br />

Performing Social Engineering Attacks<br />

The process of social engineering is actually pretty basic. Generally, social<br />

engineers discover the details of organizational processes and information<br />

systems to perform their attacks. With this information, they know what to<br />

pursue. Hackers typically perform social engineering attacks in four simple<br />

steps:<br />

1. Perform research.<br />

2. Build trust.<br />

3. Exploit relationships for information through words, actions, or technology.<br />

4. Use the information gathered for malicious purposes.<br />

These steps can include numerous substeps and techniques, depending on<br />

the attack being performed.<br />

Before social engineers perform their attacks, they need a goal. This is the<br />

first step in these attackers’ processes for social engineering, and this goal is<br />

most likely already implanted in their minds. What do they want to accomplish?<br />

What are the social engineers trying to hack? Why? Do they want<br />

intellectual property, server passwords, or access to control badges, or do<br />

they simply want to prove that the company’s defenses can be penetrated?<br />

In your efforts as an ethical hacker performing social engineering, determine<br />

this overall goal before you move forward.<br />

Seeking information<br />

After social engineers have a goal in mind, they typically start the attack by<br />

gathering public information about their victim(s). Many social engineers<br />

acquire information slowly over time so they don’t raise suspicion. Obvious<br />

information gathering is a tip-off when defending against social engineering. I<br />

mention other warning signs to be aware of throughout the rest of this chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!