penetration testing and social engineering

23
What will we do today? Penetra1on Tes1ng discussion Types of services Social Engineering Reallife examples Nontech view Dark side? Interac1ve

Upload: sensepost

Post on 01-Nov-2014

1.323 views

Category:

Technology


1 download

DESCRIPTION

Presentation by Yvette du Toit to the University Of Pretoria's honors class of 2011. This presentation is about penetration testing and social engineering. A walkthrough of a social engineering attack is given in this presentation

TRANSCRIPT

Page 1: Penetration testing and social engineering

What  will  we  do  today?    

•  Penetra1on  Tes1ng  discussion  – Types  of  services  

•  Social  Engineering  – Real-­‐life  examples  

•  Non-­‐tech  view  – Dark  side?  

•  Interac1ve    

Page 2: Penetration testing and social engineering

Penetra1on  Tes1ng      

•  What?  – Rude  word……  – What  do  you  think?  

Page 3: Penetration testing and social engineering

Breakdown      

•  Build  Review  •  Infrastructure  •  Applica1on  •  Code  Review  •  Reverse  Engineering  •  MVS  (PCI,  Int,  Ext  etc)  

•  WLAN  •  Database  •  AD  

Page 4: Penetration testing and social engineering

Ops  J    

•  Client  discussions  •  Proposal  •  Acceptance  /  PO  •  Rest  of  paperwork  (SOW  et  al)  

•  Resources  /  Schedule  •  Delivery  

•  Report  •  Invoice  

Page 5: Penetration testing and social engineering

Oops    L    

•  What  can  go  wrong?  – DoS  – Wrong  scope  – Mis-­‐match  resources  – Dissa1sfied  clients  – Non-­‐payment  

Page 6: Penetration testing and social engineering

Social  Engineering  

(SE)    

•  Art  of  decep1on?  – Manipula1on  – Disclosure  

•  What  do  you  see  as  SE?  – Examples  

Page 7: Penetration testing and social engineering

SE:  Anatomy    

•  Agree  scope  – What  is  in?  – What  is  out?  MAKE  THIS  VERY  CLEAR  

•  Reconnaissance  – Onsite  – Web  – News  

Page 8: Penetration testing and social engineering

SE:  Anatomy  Cont’d    

•  Plan  based  on  reconnaissance  – Approximate  idea  of  execu1on  – Poten1al  back-­‐up  plans  of  delivery  failure  – Changing  course  based  on  scenario  

Page 9: Penetration testing and social engineering

SE:  Characteris1cs  

&  Tools    CHARACTERISTICS  

•  Guts  •  Keep  calm  •  Think  on  your  feet  •  Change  tac1cs  whilst  keeping  your  wits  about  you  

 

 TOOLS  

•  Internet  •  Google  Earth  •  Charm  •  Manners  •  Gadgets  (phone,  camera)  

   

Page 10: Penetration testing and social engineering

SE:  Outcome  /  Results  

•  Report  •  Evidence  (MOST  IMPORTANT)      

Page 11: Penetration testing and social engineering

SE:  Example  

•  Crea1ng  a  fake  email  account  with  a  real  person’s  name.    

•  Ellen  belongs  to  a  company  loosely  affiliated  with  the  target.  

Page 12: Penetration testing and social engineering

SE:  Example  Cont’d  

•  Sending  an  email  from  “Ellen”  to  many  hundreds  of  employees  of  the  target  company.    

•  The  email  contents  is  based  on  a  real  event  that  the  target  company  held  (gleaned  from  their  news  website).    

•  The  email  encourages  people  to  visit  a  website,  which  appears  to  be  legi1mate.    

Page 13: Penetration testing and social engineering

SE:  Example  Cont’d  

 •  The  website  is  a  duplicate  of  the  target  

company  website,  with  a  few  minor  modifica1ons  to  go  along  with  the  farcical  story  from  the  email.    

•  The  page  a]empts  to  run  a  Java  applet  (next  slide).  

Page 14: Penetration testing and social engineering

SE:  Example  Cont’d  

 •  Should  the  user  click  yes  to  running  the  

applet  from  the  site,  some  hos1le  Java  will  execute  which  will  compromise  the  machine,  and  give  the  a]acker  full  control  (as  in  next  slide)  

Page 15: Penetration testing and social engineering

SE:  Example  Cont’d  

 

•  Pwnd  ;)    •  Logs  of  people  visi1ng  the  site  

Page 16: Penetration testing and social engineering

SE:  Example  Cont’d  

•  Oddly  enough,  a  real  employee  (Fred)  replied  to  the  a]acker  with  real  comments  about  the  site.    

•  This  was  useful  as  it  gave  us  his  name  /  email  signature  etc.  which  could  be  used  to  create  another  fake  email  account  abusing  his  informa1on.  

Page 17: Penetration testing and social engineering

SE:  Example  Cont’d  

 

Crea1ng  a  fake  account  for  target  company  employee  Fred  

Page 18: Penetration testing and social engineering

SE:  Example  Cont’d  

•  The  en1re  email  is  forged  from  Fred,  but  it  appears  as  though  he  is  forwarding  on  an  email  –  which  is  made  to  look  like  it  came  from  a  real  employee.    

•  Here  we  abuse  the  chain  of  trust.    •  The  email  encourages  users  to  go  to  a  

Microsob  website  to  download  an  urgent  update  

Page 19: Penetration testing and social engineering

SE:  Example  Cont’d  

   

•  The  a]acker  has  downloaded  a  real  MS  update,  but  sneakily  inserted  some  hos1le  code  (The  “hot”  file).    

•  This  is  hosted  on  a  fake  MS  website  (next  slide)  

Page 20: Penetration testing and social engineering

SE:  Example  Cont’d  

 

Looks  legit?  Almost  too  good  to  be  true.  

Page 21: Penetration testing and social engineering

SE:  Example  Cont’d  

 •  Here  we  see  a  user  downloading  and  

running  the  file-­‐  the  result  of  which  his  AV  being  killed,  a  screenshot  of  his  desktop  being  taken,  and  full  control  of  his  machine  given  to  the  a]acker.  

•  Game  over.  

Page 22: Penetration testing and social engineering

     

   

Ques1ons  

Page 23: Penetration testing and social engineering

Contact  Details  

Name:  Yve]e  du  Toit  Email:    yve][email protected]