19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

74<br />

Part II: Putting Ethical Hacking in Motion<br />

often takes time. Crafty social engineers can gain it within minutes or hours.<br />

How do they do it?<br />

✓ Likability: Who can’t relate to a nice person? Everyone loves courtesy.<br />

The friendlier social engineers are — without going overboard — the<br />

better their chances of getting what they want. Social engineers often<br />

begin to build a relationship by establishing common interests. They<br />

often use the information they gain in the research phase to determine<br />

what the victim likes and to pretend that they like those things, too.<br />

They can phone victims or meet them in person and, based on information<br />

the social engineers have discovered about the person, start talking<br />

about local sports teams or how wonderful it is to be single again. A few<br />

low-key and well-articulated comments can be the start of a nice new<br />

relationship. Of course, good looks don’t hurt either.<br />

✓ Believability: Believability is based in part on the knowledge that<br />

social engineers have and how likable they are. Social engineers also<br />

use impersonation — perhaps by posing as new employees or fellow<br />

employees that the victim hasn’t met. They may even pose as vendors<br />

who do business with the organization. They often modestly claim<br />

authority to influence people. The most common social engineering trick<br />

is to do something nice so that the victim feels obligated to be nice in<br />

return or to be a team player for the organization.<br />

Exploiting the relationship<br />

After social engineers obtain the trust of their unsuspecting victims, they coax<br />

the victims into divulging more information than they should. Whammo — the<br />

social engineer can go in for the kill. Social engineers do this through face-toface<br />

or electronic communication that victims feel comfortable with, or they<br />

use technology to get victims to divulge information.<br />

Deceit through words and actions<br />

Wily social engineers can get inside information from their victims in many<br />

ways. They are often articulate and focus on keeping their conversations<br />

moving without giving their victims much time to think about what they’re<br />

saying. However, if they’re careless or overly anxious during their social engineering<br />

attacks, the following tip-offs might give them away:<br />

✓ Acting overly friendly or eager<br />

✓ Mentioning names of prominent people within the organization<br />

✓ Bragging about authority within the organization

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!