19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

76<br />

Part II: Putting Ethical Hacking in Motion<br />

Even professionals can be socially engineered<br />

Here’s how I fell prey to a social engineer<br />

because I didn’t think before I spoke. One day, I<br />

was having trouble with my high-speed Internet<br />

connection. I contacted my ISP and told the<br />

tech-support guy that I couldn’t remember my<br />

password. This sounds like the beginning of a<br />

social engineering stunt that I could’ve pulled<br />

off, but I got taken instead. The slick tech-support<br />

guy paused for a minute, as if he were pulling<br />

up my account info, and then asked, “What<br />

password did you try?”<br />

Stupid me, I proceeded to repeat all the passwords<br />

it could’ve been. The phone went quiet<br />

for a moment. He reset my password and told<br />

me what it was. After I hung up, I thought,<br />

“What just happened? I think just got social<br />

engineered!” It may not have been intentional<br />

on his part. His question could’ve just been<br />

part of their procedures for resetting accounts.<br />

Either way, it was a dumb mistake on my part.<br />

I changed all the passwords that I divulged<br />

related to my Internet account in case he used<br />

that information against me. Lesson learned:<br />

Never, under any circumstances, divulge<br />

your password to someone else — another<br />

employee, your boss, a support technician,<br />

whomever — even if they ask for it. The consequences<br />

just aren’t worth the perceived benefit.<br />

Deceit through technology<br />

Technology can make things easier — and more fun — for the social engineer.<br />

Often, a malicious request for information comes from a computer or<br />

other electronic entity that the victims think they can identify. But spoofing<br />

a computer name, an e-mail address, a fax number, or a network address is<br />

easy. Fortunately, you can take a few countermeasures against this type of<br />

attack, as described in the next section.<br />

Hackers can deceive through technology by sending e-mail that asks victims<br />

for critical information. Such an e-mail usually provides a link that directs<br />

victims to a professional- and legitimate-looking website that “updates” such<br />

account information as user IDs, passwords, and Social Security numbers.<br />

They might also do this on social networking sites, such as Facebook and<br />

Myspace.<br />

Many spam and phishing messages also use this trick. Most users are inundated<br />

with so much spam and other unwanted e-mail that they often let their<br />

guard down and open e-mails and attachments they shouldn’t. These e-mails<br />

usually look professional and believable. They often dupe people into disclosing<br />

information they should never give in exchange for a gift. These social<br />

engineering tricks also occur when a hacker who has already broken into the<br />

network sends messages or creates fake Internet pop-up windows. The same<br />

tricks have occurred through instant messaging and cellphone messaging.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!