19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5: Social Engineering<br />

Regardless of the initial research method, all a hacker might need to penetrate<br />

an organization is an employee list, a few key internal phone numbers,<br />

the latest news from a social media website, or a company calendar.<br />

Using the Internet<br />

Today’s basic research medium is the Internet. A few minutes searching on<br />

Google or other search engines, using simple keywords, such as the company<br />

name or specific employees’ names, often produces a lot of information. You<br />

can find even more information in SEC filings at www.sec.gov and at such<br />

sites as www.hoovers.com and http://finance.yahoo.com. (Many organizations<br />

— especially their management — would be dismayed to discover<br />

the organizational information that’s available online.) By using this searchengine<br />

information and browsing the company’s website, the attacker often<br />

has enough information to start a social engineering attack.<br />

The bad guys can pay just a few dollars for a comprehensive online background<br />

check on individuals. These searches can turn up practically any<br />

public — and sometimes private — information about a person in minutes.<br />

Dumpster diving<br />

Dumpster diving is a little more risky — and it’s certainly messy. But, it’s a<br />

highly effective method of obtaining information. This method involves literally<br />

rummaging through trash cans for information about a company.<br />

Dumpster diving can turn up even the most confidential information because<br />

many employees assume that their information is safe after it goes into the<br />

trash. Most people don’t think about the potential value of the paper they<br />

throw away. And I’m not just talking about the recycle value! These documents<br />

often contain a wealth of information that can tip off the social engineer<br />

with information needed to penetrate the organization further. The<br />

astute social engineer looks for the following printed documents:<br />

✓ Internal phone lists<br />

✓ Organizational charts<br />

✓ Employee handbooks, which often contain security policies<br />

✓ Network diagrams<br />

✓ Password lists<br />

✓ Meeting notes<br />

✓ Spreadsheets and reports<br />

✓ Printouts of e-mails that contain confidential information<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!