02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

238 Chapter 10 ■ Social Engineering<br />

In many of the cases discussed in this book, you have seen social engineering play a role.<br />

One such example, is that of Trojans which exploit social engineering to entice a victim<br />

to open an executable or attachment that is infected with malware. A Trojan is a piece of<br />

malware that relies primarily on the element of social engineering as a mechanism to start<br />

an infection. Using the social-engineering aspect, virus writers can entice an unsuspecting<br />

victim into executing malware with the promise of giving them something they expect<br />

or want.<br />

Another example of how social engineering works is the case of scareware. This type<br />

of malware is designed to frighten a victim into taking action when none is necessary. The<br />

best example is the case of fake antivirus products that prompt users with very realistic, but<br />

fake, messages that they should download an “antivirus” to disinfect their system.<br />

In both cases, simple training and awareness could easily stop an attack before a security<br />

incident occurred. You should know the signs of social engineering plus include a dose of<br />

common sense prior to implementing social engineering in your testing. Some common<br />

signs that may indicate a social-engineering attack include, but are not limited to, the<br />

following:<br />

■ Use of authority by an attacker, such as making overt references to who they are or<br />

who they know or even making threats based on their claimed power or authority.<br />

■ Inability to give valid contact information that would allow the attacker to be called or<br />

contacted as needed.<br />

■ Making informal or off-the-book requests designed to encourage the victim to give out<br />

information that they may not otherwise.<br />

■ Excessive name-dropping as to who the attacker knows inside the organization.<br />

■ Excessive use of praise or compliments designed to flatter a victim.<br />

■ Show of discomfort or uneasiness when questioned.<br />

Why is Social Engineering Successful?<br />

Why has social engineering been successful, and why will it continue to be so? To answer<br />

this, you must first understand why it works and what this means to you as a pentesters.<br />

Going after the human being instead of the technology works for a number of reasons:<br />

Trust Human beings are a trusting lot. It’s built into the species. When you see someone<br />

dressed a certain way (such as wearing a uniform) or hear them say the right words, it<br />

causes you to trust them more than you normally would. For example, if you see someone<br />

dressed in a set of scrubs and carrying a stethoscope, it causes you to trust them. This<br />

tendency to trust is a weakness that can be exploited.<br />

Human Habit and Nature Human beings tend to follow certain default habits and actions<br />

without thinking. People take the same route to work, say the same things, and take the<br />

same actions without thought. In many cases, humans have to consciously attempt to<br />

act differently from the norm in order to break from their learned habits. A good social

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!