Social EngineeringArticle written by: Robert Zagorac Last Revision: April 6, 2007. The purpose of this article is to describe the concept of social engineering. Social
engineering is a combination, or in a more cynical sense, an
arsenal, of various methods of manipulation that one may employ to
gain access to confidential material or secrets to which they are not privy[1]. The primary characteristic of these methods is
that they are psychological in nature. This article deals with
social engineering
when used to exploit computer networks Social engineering is specifically effective because it bypasses intrusion detection systems
It is important to understand that social engineering is not always an attempt to actively trick someone and that it relies on exploiting the laziness, trust, greed or lack of foresight in individuals[2].
The Social Engineer's TacticsThe following are some of the methods and means employed by the social engineer: ResearchThe first step a social engineer or group of social engineers will take towards gaining unauthorized access to an individual's workstation or organization's network will be to conduct research[1]. The social engineer is at a great advantage here because he can control the time frame. Some things a social engineer may try to discover are:
Any information is valuable to the social engineer. Even something such as a persons email signature Research MethodsThe social engineer has a large arsenal of research methods such as: AskingDue to the common trusting nature of people, including network administration and human resources department staff, it is often as simple as making a phone call to learn the names and additional personal information of employees, managers and other important people[1]. Directories and Web sitesIf the social engineer is working from within the organization, employee directories are excellent places to
gather users' personal information. Also, by using networking web sites such as Face-book Dumpster DivingUser names and passwords to computer networks are often written down or printed out as hard copies. These and other sensitive security documents such as phone directories, policy manuals, memos, meeting schedules and even letterheads are eventually thrown out, only to be found during the social engineers Friday night dumpster dive[ 4] . Dumpster diving relies on the trusting nature of persons and their belief that no one would attempt to steal garbage. As well, many people are too lazy to ensure that sensitive documents are rendered unreadable prior to disposal. Gaining Access
Once the social engineer has completed his research, he likely has a large amount of information that will prove invaluable in his efforts to gain access to his target. Persuasion and Pre-textingPre-texting is another common method often used by social engineers, an example of which is phishing. Pre-texting
involves the social engineer setting up a fictional situation to deceive a user into performing some
action[5]. In terms of
network security, a social engineer may know a certain users account name and call technical support GimmesA gimme is a form of social engineering that relies on the greed or curiosity of a user[3]. Users are often coerced into
opening email when they contain subject lines such as "You've won!" or "I Love You." even if the sender's name is
unfamiliar. As well, social engineers may create official looking emails using information discovered during the
research phase. These emails will contain attachments Reverse Social EngineeringOne of the most advanced methods of social engineering and also one of the most difficult to carry out is that of reverse social engineering. Reverse social engineering usually requires that the social engineer be working closely with an individual or organization. First, the social engineer sets up some sort of network problem. He then makes it known that he is the one who has the solution to that problem. Once the affected individuals are convinced of this fact, he requests certain pieces of information that he states are necessary to fix the problem such as account names and passwords, the very information he intended to gain[ 4]. Prevention TechniquesThere are a number of techniques that an organization can use to ensure that users are protected from the attacks of social engineers. AwarenessLack of awareness is a great asset in the social engineer's favor[5]. Because so few people realize that social engineering is a serious threat, they allow themselves to be more easily victimized. Any network administrator or network service provider should be knowledgeable in social engineering methods. This knowledge could be gained through a certification such as GIAC. PoliciesAn organization's security policy See Also
References
External Links |