<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>M. Ștefan Cristian</title>
	<atom:link href="/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Infosec engineer navigating the digital &#38; analog realms</description>
	<lastBuildDate>Tue, 17 Jan 2023 20:24:06 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>/wp-content/uploads/2021/10/icon.png</url>
	<title>M. Ștefan Cristian</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executing the Evil Twin Wireless Attack</title>
		<link>/2023/01/17/executing-the-evil-twin-wireless-attack/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Tue, 17 Jan 2023 20:24:06 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#EvilTwin]]></category>
		<category><![CDATA[#WirelessAttack]]></category>
		<guid isPermaLink="false">/?p=689</guid>

					<description><![CDATA[The following document is one of the case studies we carried out in the 1st semester at the Advanced Cybersecurity<p><a href="/2023/01/17/executing-the-evil-twin-wireless-attack/" class="more-link">Continue reading<span class="screen-reader-text">Executing the Evil Twin Wireless Attack</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover is-repeated" style="min-height:300px;aspect-ratio:unset;"><span aria-hidden="true" class="wp-block-cover__background has-background-dim"></span><div role="img" class="wp-block-cover__image-background wp-image-693 is-repeated" style="background-position:50% 50%;background-image:url(/wp-content/uploads/2023/01/evilTBlacked.png)"></div><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-large-font-size"></p>
</div></div>



<hr class="wp-block-separator has-text-color has-medium-gray-color has-alpha-channel-opacity has-medium-gray-background-color has-background is-style-default"/>



<p>The following document is one of the case studies we carried out in the 1<sup>st</sup> semester at the Advanced Cybersecurity MSc. (Polytechnic University of Bucharest). It describes how a rogue wireless access point (a.k.a. the &#8220;Evil Twin&#8221;) can be created to mimic a legitimate one, in order to trick users to connect to it.<br><br>The paper also contains a working proof-of-concept (<a rel="noreferrer noopener" href="https://www.malwarebytes.com/glossary/proof-of-concept" target="_blank">PoC</a>) that presents the main steps that I personally took while executing this attack (along with the needed hardware &amp; software). This is something you <strong>should try <em>only</em> at home</strong>, <strong>on your own equipment</strong> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f605.png" alt="😅" class="wp-smiley" style="height: 1em; max-height: 1em;" />.<br><br>The goal was to gracefully steal <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color"><em>precious</em> WiFi passwords</mark> with an Evil Twin and a little bit of <a rel="noreferrer noopener" href="https://mstefanc.com/2022/03/20/social-engineering-playing-with-human-vulnerabilities/" data-type="URL" data-id="https://mstefanc.com/2022/03/20/social-engineering-playing-with-human-vulnerabilities/" target="_blank">Social Engineering</a>, instead of applying brute-force to guess them (which sometimes takes <a rel="noreferrer noopener" href="https://www.hivesystems.io/blog/are-your-passwords-in-the-green" data-type="URL" data-id="https://www.hivesystems.io/blog/are-your-passwords-in-the-green" target="_blank">a little bit too much time</a> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f480.png" alt="💀" class="wp-smiley" style="height: 1em; max-height: 1em;" />).</p>



<iframe src="https://drive.google.com/file/d/1DnZtQ5aZOdCdB4zPA1zd6bKkvaym39ap/preview" allow="autoplay" width="1999" height="1200"></iframe>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The PPT presentation of the paper:</p>



<iframe src="https://drive.google.com/file/d/1sXDuxfM9R8n4ueTwZfTBKzGjTVqDjDU9/preview" allow="autoplay" width="1500" height="800"></iframe>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNbreakable CTF 2022 (teams) Writeups</title>
		<link>/2022/05/23/unbreakable-ctf-2022-teams-writeups/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Mon, 23 May 2022 01:43:53 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#CTF]]></category>
		<category><![CDATA[ctfwriteup]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[win]]></category>
		<guid isPermaLink="false">/?p=625</guid>

					<description><![CDATA[This CTF contest phase took place between 20th &#8211; 22nd of May 2022. We competed against 70 teams (from both<p><a href="/2022/05/23/unbreakable-ctf-2022-teams-writeups/" class="more-link">Continue reading<span class="screen-reader-text">UNbreakable CTF 2022 (teams) Writeups</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img fetchpriority="high" decoding="async" width="2400" height="1370" class="wp-block-cover__image-background wp-image-654" alt="" src="/wp-content/uploads/2022/05/birmingham-museums-trust-5EUh-tq31eA-unsplash-2-overlay-1.png" style="object-position:51% 32%" data-object-fit="cover" data-object-position="51% 32%"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-small-font-size"><em>UNR 22</em> <br><strong>won.</strong></p>
</div></div>



<hr class="wp-block-separator"/>



<p>This <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" data-type="URL" data-id="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" target="_blank">CTF</a> contest phase took place between 20<sup>th</sup> &#8211; 22<sup>nd</sup> of May 2022. <br>We competed against <strong>70</strong> teams (from both Romania and Republica Moldova).<br>We all had exactly <strong>48</strong> hours to find vulnerabilities &amp; exploit them in <strong>25</strong> challenges (me &amp; my team finished everything in under <strong>33</strong> hours).</p>



<p>As a <strong>result</strong>, this time, we managed to get the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color"><strong>1<sup>st</sup></strong> place</mark>  ¯\_(ツ)_/¯ .</p>



<p><strong>Team&nbsp;</strong><em>‘The Few Chosen’</em> :&nbsp;<strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">Noria, D. Toma, Spurge</mark></strong> <em>(ç&#8217;est moi)</em>, representing the Babeș-Bolyai University.<br>The official national ranks:&nbsp;<a rel="noreferrer noopener" href="https://unr22-echipe.cyberedu.ro/#ranks" data-type="URL" data-id="https://unr22-echipe.cyberedu.ro/#ranks" target="_blank">https://unr22-echipe.cyberedu.ro/#ranks</a>.<br><br>All of our writeups can be found on <a rel="noreferrer noopener" href="https://glacier-acrylic-3f2.notion.site/UNbreakable-Romania-2022-29fa4ed917434de185c0d371cbb7b32a" data-type="URL" data-id="https://glacier-acrylic-3f2.notion.site/UNbreakable-Romania-2022-29fa4ed917434de185c0d371cbb7b32a" target="_blank">Notion</a>, or below.</p>



<p class="has-normal-font-size"><em>Stay safe*</em>  :&#8217;)</p>



<iframe loading="lazy" width="1999" height="1200" src="https://drive.google.com/file/d/1MI3-6aSzQSn3JcEc2v_-XRJhCF9gRwGQ/preview" allow="autoplay"></iframe>



<hr class="wp-block-separator"/>



<div class="wp-block-image"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="/wp-content/uploads/2022/05/Diploma_Spurge_teams_UNR22.png" alt="" class="wp-image-649" width="744" height="526"/></figure></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNbreakable CTF 2022 (individual) Writeups</title>
		<link>/2022/05/08/unbreakable-ctf-2022-individual-writeups/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Sun, 08 May 2022 22:52:45 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#CTF]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">/?p=609</guid>

					<description><![CDATA[This contest phase took place between 6th &#8211; 8th of May 2022 and had 165 active participants (from both Romania<p><a href="/2022/05/08/unbreakable-ctf-2022-individual-writeups/" class="more-link">Continue reading<span class="screen-reader-text">UNbreakable CTF 2022 (individual) Writeups</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover" style="min-height:463px;aspect-ratio:unset;"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img loading="lazy" decoding="async" width="1250" height="833" class="wp-block-cover__image-background wp-image-612" alt="" src="/wp-content/uploads/2022/05/CTF_img.png" style="object-position:46% 50%" data-object-fit="cover" data-object-position="46% 50%"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-small-font-size"><code><em>UNR 22</em></code></p>
</div></div>



<hr class="wp-block-separator"/>



<p>This contest phase took place between 6<sup>th</sup> &#8211; 8<sup>th</sup> of May 2022 and had 165 active participants (from both Romania and Republica Moldova).</p>



<p>I managed to get the <strong>14<sup>th</sup></strong> place, or <strong>10<sup>th</sup></strong> place for my category (university). All the official ranks can be found here: <a href="https://unbreakable.ro/clasament" target="_blank" rel="noreferrer noopener">https://unbreakable.ro/clasament</a>. <br>Even though this was the <em>individual</em> phase, I have to congratulate my two teammates (and faculty colleagues), <strong>Noria</strong> and <strong>Toma</strong>, who managed to get the <strong>1<sup>st</sup></strong> and <strong>2<sup>nd</sup></strong> place respectively. GG.</p>



<p>However, even though I had a busy weekend, I still solved <strong>80%</strong> of the given challenges. The writeups can be found below.</p>



<iframe loading="lazy" width="1999" height="1200" src="https://drive.google.com/file/d/1ssC1KX-Jg0cEWgPpC4RrVFaUtfX0EeWD/preview" allow="autoplay"></iframe>



<hr class="wp-block-separator"/>



<div class="wp-block-image is-style-default"><figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="/wp-content/uploads/2022/05/ae444f90-9c60-11eb-b4a2-87f5b1a33560.png" alt="" class="wp-image-618" width="831" height="588"/></figure></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Engineering. Playing with human vulnerabilities :)</title>
		<link>/2022/03/20/social-engineering-playing-with-human-vulnerabilities/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Sun, 20 Mar 2022 18:40:20 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#manipulation]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<guid isPermaLink="false">/?p=354</guid>

					<description><![CDATA[What is social engineering ? Well, given the plethora of news about scammers and people being easily fooled by them,<p><a href="/2022/03/20/social-engineering-playing-with-human-vulnerabilities/" class="more-link">Continue reading<span class="screen-reader-text">Social Engineering. Playing with human vulnerabilities :)</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover is-light"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img loading="lazy" decoding="async" width="1920" height="1280" class="wp-block-cover__image-background wp-image-355" alt="" src="/wp-content/uploads/2022/03/dan-farrell-fT49QnFucQ8-unsplash.jpg" style="object-position:50% 36%" data-object-fit="cover" data-object-position="50% 36%"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p></p>



<p></p>



<p class="has-text-align-center has-light-gray-color has-text-color has-normal-font-size"><em><strong>If you think you can’t be tricked, you’re just the person I’d like to meet.</strong></em></p>



<p class="has-text-align-center has-light-gray-color has-text-color has-extra-small-font-size">R. Paul Wilson</p>



<p></p>
</div></div>



<hr class="wp-block-separator"/>



<h3 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">What</mark> is social engineering ? </h3>



<p>Well, given the plethora of news about scammers and people being easily fooled by them, the public opinion about this subject is anything but positive. However,<mark style="background-color:rgba(0, 0, 0, 0);color:#139213" class="has-inline-color">make no mistake</mark>, it surely isn&#8217;t just that&#8230; <br>Actually, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color"><em><strong>social engineering</strong></em> is the art, or better yet, science of skillfully maneuvering a person to take an action that <em> <strong>may</strong></em>  or <em> <strong>may not</strong></em>  be in the &#8220;target&#8217;s&#8221; best interest</mark>. Thus, besides crimes, you can also notice it in: business marketing, the way children get their parents to give in to their demands, the way doctors, lawyers, or psychologists obtain information from their clients. Obviously, you can also find it in law enforcement, and in dating — it is truly used in every human interaction, from babies to politicians &#8230;</p>



<h3 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Types</mark> of social engineers</h3>



<ul class="wp-block-list"><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Hackers &amp; Penetration testers</mark></strong>: as modern software gets more difficult to break into, hackers are turning to social engineering skills more than ever.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Spies</mark></strong>: simply put, it is a lifestyle for them. They mostly use it to build credibility and to &#8220;fool&#8221; victims into believing they are someone or something they are not.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Identity thieves</mark></strong>: they use information such as a person&#8217;s name, bank account numbers, address, birth date, and social security number without the owner&#8217;s knowledge.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Disgruntled employees</mark></strong>: often enter into an adversarial relationship with their employer. They typically hide their level of displeasure to not put their employment at risk, yet they resort to theft, vandalism or other crimes as revenge (moles).</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Scammers</mark></strong>: usually driven by greed or the desire to &#8220;make a buck&#8221;. They master the ability of reading people in order to target a vulnerable victim.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Executive recruiters</mark></strong>: are very adept at not only reading people but also understanding what motivates people, in order to please both the job seeker and the job poster.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Salespeople</mark></strong>: use their skills to find out what people&#8217;s needs are and then see whether they can satisfy them.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Governments</mark></strong>: use it to control the messages they release as well as the people they govern (they utilize techniques like: social proof, authority and scarcity). This is not always negative, as some of their messages are for the good of the people, and using certain elements of social engineering can make the message more appealing and more widely accepted. However, when politicians want to <strong>avoid</strong> talking about something, they resort to using <strong><em><a rel="noreferrer noopener" href="https://photos.app.goo.gl/4tj6fEHwK1f4XH6u8" data-type="URL" data-id="https://photos.app.goo.gl/4tj6fEHwK1f4XH6u8" target="_blank">Wooden Language</a></em></strong> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-blue-color">(this is a perfect example that I found while visiting <em>The</em> <em>Romanian Kitsch Museum</em> in Bucharest)</mark>.</li><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Doctors, psychologists, and lawyers</mark></strong>: must use elicitation and proper interview and interrogation tactics, as well as many if not all of the psychological principles of social engineering to manipulate their clients into the direction they want them to take.</li></ul>



<hr class="wp-block-separator is-style-wide"/>



<p class="has-text-align-center">Given the information above, you&#8217;ve probably realized that there&#8217;s a high probability to be a target of such trickery. <br><em>How do I stay safe?</em>  Great question. <br>Well, what I can say for sure, is that you are <em>safer</em> if you know and understand the techniques used for a successful <strong>social engineering attack</strong>. This is why, in the next section, I&#8217;m going to explain <strong>decisive skills</strong> like: <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">information gathering</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">elicitation</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">pretexting</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">microexpressions</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Neurolinguistic Programming</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">interview &amp; interrogation</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">building rapport</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">The Human Buffer Overflow</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">influence tactics</mark> (reciprocation, obligation, concession, scarcity, authority, commitment, liking, social proof), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">framing</mark>, and, the last but not least, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">manipulation</mark>.</p>



<p class="has-text-align-center has-eighty-black-background-color has-background has-normal-font-size"><kbd><em><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">With enough time and enough effort anyone can be social engineered. Those words are true, as scary as they are. That doesn’t mean there is no hope; it means your job is to make malicious social engineering so difficult and time consuming that most hackers will give up.</mark></em> </kbd><br><kbd>(Christopher Hadnagy)</kbd></p>



<p class="has-text-align-center has-small-font-size">As usual, this information is for education purposes only. A lot of social engineers face <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">prison</mark></strong> time as well. So, have fun, but respect the legal and ethical constraints. Otherwise, make sure that you&#8217;re hiding better than everyone else can hide, in the 21<sup>st </sup>century.</p>



<hr class="wp-block-separator is-style-wide"/>



<h3 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f575-fe0f-200d-2640-fe0f.png" alt="🕵️‍♀️" class="wp-smiley" style="height: 1em; max-height: 1em;" /></mark><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Information</mark> gathering</h3>



<p class="has-normal-font-size">The most important phase of the attack. Usually takes from days to months, depending on the target. For example, this is what the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Russian government</mark> had been doing for at least 8 years in Ukraine, using <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">cyberattacks</mark> and <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">spies</mark>, before starting an invasion on 24<sup>th</sup> of February 2022.</p>



<p class="has-normal-font-size"><strong>Mindset</strong>: no piece of information is irrelevant; even the slightest detail can lead to a successful breach.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><strong>Example</strong>: <strong>Mati Aharoni</strong> (professional pentester) was tasked with gaining access to a company that had an almost nonexistent Web footprint. After some internet searching, he found a high-ranking company official who used his corporate email on a forum about stamp collecting and who expressed an interest in stamps from the 1950s. Mati created a website like <code>stampcollections.com</code>, where he put 1950s stamp photos found on Google, and embedded a malicious frame that exploited a vulnerability in the popular web browser at the time. So, <strong>accessing the link</strong> would give the attacker control over the victim&#8217;s computer. Then, he crafted an email for this company official. In the email, it&#8217;s stated that he&#8217;s another user of the same forum, who noticed the interest in old stamps, and that his grandfather, who &#8216;passed away&#8217;, left a stamp collection that can be seen on Mati&#8217;s <kbd>stampcollections.com</kbd> website. Before sending the email, for maximum impact, he called the target on the phone. This way, Mati built trust by discussing on a friendly tone about his stamp offer, while also expressing some feelings of sadness for the recent death in his family (triggering compassion). Thus, the target was very eager to see this collection. As soon as the man received the email, he clicked the link and the company’s perimeter was compromised. The <em><strong>tiny piece of information</strong></em> that led to this successful attack: a corporate email on a random website.</p>



<p class="has-normal-font-size">The <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">problem</mark></strong>: using social media, people can easily share every aspect of their lives with anyone they choose, making potentially damaging information (for their personal &amp; business security) more readily available than ever before. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><strong>Example</strong>: Max Fosh infiltrated into <strong><em>The International Security</em></strong> <strong><em>Convention</em></strong> (the irony). He used a badge found on an <strong>Instagram</strong> post from the event (edited a little bit in Photoshop, then printed) -> video: <a rel="noreferrer noopener" href="https://www.youtube.com/watch?v=qM3imMiERdU" target="_blank">https://youtu.be/qM3imMiERdU</a>. </p>



<p class="has-normal-font-size">Also, many employees talk about their job title in their social media outlets. This can help a social engineer to profile how many people may be in a department and how the departments are structured.<br>Other <strong>sources</strong> <strong>&amp; techniques</strong>: Apple/Google Maps (for an idea about the target&#8217;s buildings, ways in &amp; out), <a rel="noreferrer noopener" href="https://www.googleguide.com/advanced_operators_reference.html" data-type="URL" data-id="https://www.googleguide.com/advanced_operators_reference.html" target="_blank">Google Dorks</a>, <a rel="noreferrer noopener" href="https://who.is/" data-type="URL" data-id="https://who.is/" target="_blank">WhoIs</a>, NMAP, <a rel="noreferrer noopener" href="https://www.maltego.com/" data-type="URL" data-id="https://www.maltego.com/" target="_blank">Maltego</a>, forums, overhearing conversations, flirting with the target, public reports, or simply the trash (you&#8217;d be surprised how much sensible information is literally dumped). <br><strong>Attackers look for the links between the information extracted from all sources, to create a whole profile.</strong> This profile includes contact numbers, biographies, email naming conventions, special words or phrases that can help in password profiling, family members, physical locations, purchases, leases, contracts, favorite foods/teams/music, the service companies used, etc. Everything is processed in order to find vulnerabilities and come up with the best attack strategy.</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f4ac.png" alt="💬" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Elicitation</mark></h3>



<p class="has-normal-font-size">In training materials, the <strong><a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/National_Security_Agency" data-type="URL" data-id="https://en.wikipedia.org/wiki/National_Security_Agency" target="_blank">National Security Agency</a></strong> of the United States government defines elicitation as “<strong>the subtle extraction of information during an apparently normal and innocent conversation</strong>.” Generally speaking, being able to use elicitation means you can fashion questions that draw people out and stimulate them to take a <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">path</mark> of a behavior you want</strong>. <br>This method works so well because the conversation can occur anywhere the target feels comfortable (their routine places, for example). Other reasons are that: <br>&#8211; most people have the desire to be polite, especially to strangers<br>&#8211; professionals want to appear well informed and intelligent<br>&#8211; if you are praised, you will often talk more and divulge more<br>&#8211; most people would not lie for the sake of lying<br>&#8211; most people respond kindly to people who appear concerned about them.<br><strong>Goal</strong>: obtain information then utilize that information to motivate a target to the path you want him to take (only through casual conversation). Therefore the attacker must be &#8216;<strong>natural</strong>&#8216;, well <strong>informed</strong> about the subject he&#8217;s talking about, and <strong>not greedy</strong> with the questions, to avoid raising any red flag.</p>



<h4 class="wp-block-heading">Preloading</h4>



<p class="has-normal-font-size"><em>Preloading</em> can be a critical part of elicitation, and denotes just what it says—preload targets with ideas on how you want them to react to certain information. It is often used in marketing messages (e.g. movie trailers soundtrack). </p>



<p class="has-eighty-black-background-color has-background has-small-font-size">A simplistic <strong>example</strong>: a friend walks up and says, “I have to tell you a really funny story.” What happens to you? You might even start smiling before the story starts and your anticipation is to hear something funny, so you look and wait for opportunities to laugh. He preloaded you and you anticipated the humor. Another one: interrogators would say “Now think carefully before you answer the next question…”. This kind of statement preloads the target’s mind with the idea that he must be truthful with his next statement.</p>



<p class="has-normal-font-size">Basically, it&#8217;s all about <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">being able to plant ideas or thoughts in a way that is not obvious or overbearing</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">as a first step</mark>, <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">before starting the actual attack</mark>. Because you &#8216;preloaded&#8217; the target, when the time arises to present an absurd idea, it will most probably be accepted.</p>



<h5 class="wp-block-heading">A successful elicitor:</h5>



<ul class="has-normal-font-size wp-block-list"><li><strong>offers a non-judgmental ear</strong> for people to talk about their problems</li><li><strong>appeals to someone&#8217;s ego</strong> (e.g., when you praise someone, they&#8217;ll usually express their humbleness by talking about how the situation actually is => valuable information)</li><li><strong>expresses a mutual interest</strong></li><li><strong>makes a deliberate false statement</strong> (we have the desire to inform others, appear knowledgeable, and be intolerant to misstatements => valuable info when you&#8217;re being corrected by the others)</li><li><strong>offers information in a conversation</strong>, because it almost compels the target to reply with equally useful information</li><li><strong>uses the effects of alcohol</strong>, if possible, as it loosens the victim&#8217;s lips. This is an unfortunate but true fact.</li><li><strong>uses more open-ended questions</strong> (those that cannot be answered with yes or no)</li><li><strong>uses assumptive questions</strong> (to determine whether or not a target possesses the information you&#8217;re after).</li></ul>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f3ad.png" alt="🎭" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Pretexting</mark>: How to Become Anyone</h3>



<p class="has-normal-font-size">Pretexting is defined as the <strong>background story, dress, grooming, personality, and attitude</strong> that make up the character you will be for the social engineering audit (you create a new identity). <strong>Chris Nickerson</strong>: <em>it is not about living a lie (&#8230;). You are, in every fiber of your being, the person you are portraying. The way he walks, the way he talks, body language—you become that person.</em> </p>



<p class="has-normal-font-size">What is a good pretext based on? First of all, the<strong> quality of the information</strong> gathered beforehand. Then, the <strong>practice of dialects/expressions</strong>, the <strong>simplicity</strong> (the simpler the pretext the better the chance of success), <strong>confidence</strong> (helps a lot in convincing the target you are who you say you are; usually achieved by involving personal interests in the pretext), and the finale: providing a <strong>logical conclusion</strong> or follow through for the target. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><strong>Example</strong>: a popular <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">malicious</mark> pretext right now is the fake &#8216;fund raiser&#8217;, who takes advantage of the current Ukrainian crisis. These individuals behave like they care, presenting the atrocities of war (<em>simple</em> <em>pretext</em> that triggers people&#8217;s emotions), and demand money for helping Ukrainians (the <em>logical conclusion</em>). The same happened right after<em> 9/11</em> , 2001.</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Modes</mark> of thinking &amp; the senses</h3>



<p class="has-normal-font-size">A social engineer has to understand the modes of thinking. Why? Well, if you can first figure out the target&#8217;s dominant mode of thinking (and then use it yourself in subtle ways),  you can unlock the doors of the target&#8217;s mind and help him actually feel at ease when telling you even intimate details. So, how can you figure out someone&#8217;s dominant mode of thinking?</p>



<p class="has-normal-font-size">The world is brought to our brain by our <strong>senses</strong>: sight, hearing, touch, smell, taste (traditional classification). The modes of thinking are associated with only 3 of them. Therefore, we have the:</p>



<ul class="has-normal-font-size wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">visual</mark> thinker (majority): usually remembers what something looked like (colors, textures, brightness / darkness). He can clearly picture a past event and even build a picture for a future event. This individual usually <strong>makes a decision based on what is visually appealing to him regardless of what is really &#8220;better&#8221; for him</strong>. Often uses words like: &#8220;that looks good to me&#8221;, &#8220;I get the picture now&#8221;. Also, visuals need to look at the person speaking to communicate properly.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">auditory</mark> thinker: remembers the sounds of an event in detail (e.g., the alarm was too loud, the woman whispered too low, the scary bark of the dog). Of course, he learns better from what he hears, as in this case the sounds themselves help recall memories.  May use phrases such as: &#8220;loud and clear&#8221;, &#8220;something tells me&#8221;, &#8220;that sounds ok to me&#8221;. Whole encounters can go from great to a disaster with one wrong word spoken to an auditory thinker.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">kinesthetic</mark> thinker: remembers how an event made him feel—the warmth of the room, the beautiful breeze on his skin, how the movie made him jump out of his seat with fear. Often kinesthetic thinkers feel things with their hands to get the sense of the objects. May use phrases such as: &#8220;I can grasp the idea&#8221;, &#8220;I&#8217;ll get in touch with you&#8221;, &#8220;I just wanted to touch base&#8221;, &#8220;how does it feel?&#8221;. They don&#8217;t really react to sights and sounds, thus, social engineers have to get in touch with their feelings to communicate with them efficiently.<br>This is the type of people that must touch everything in the grocery store when they shop, whether they need it or not. By touching the objects, they make a connection. This is what helps them clearly remember the things later. </li></ul>



<p class="has-normal-font-size">Asking questions that contain some of the key dominant words, observing a target’s reactions, and listening can reveal what dominant sense he or she uses. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size">Let&#8217;s take the <strong>example</strong> of an excellent salesguy, <em><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-yellow-color">Tony</mark></strong></em>, who can figure out someone&#8217;s dominant sense in 60 seconds. When he first engages the target, he has a very shiny silver-and-gold pen in his hand. He gestures a lot and notices whether the person follows the pen with her eyes; if she does slightly, Tony will continually make the gestures bigger to see whether her eyes follow. If that doesn’t seem to work in the first few seconds, he will click the pen open and closed. It isn’t a loud noise, but loud enough to disrupt a thought and draw someone&#8217;s attention if she&#8217;d be an auditory. If he thinks that is working, he will click it with every important thought, causing the target to have a psychological reaction to the sound and what is being said. If that doesn&#8217;t seem to work, he will reach over the table and tap her wrist or forearm, or if he is close enough, touch her shoulder. He doesn&#8217;t touch excessively, but enough to see whether she will shy away or seems overly happy or disturbed by the touch. At this point, he&#8217;s most likely guessed the correct sense and starts to move the conversation in that direction, to make the target more comfortable. <br><strong>Why</strong> exactly does Tony do all of this stuff? Think about it: if someone makes you feel &#8220;warm and fuzzy&#8221;, or seems to understand what you are saying, or where you are coming from, you easily open up to, trust, and <strong>let that person in your circle</strong>. </p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f972.png" alt="🥲" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Microexpressions</mark></h3>



<p class="has-normal-font-size">Microexpressions are facial expressions which are not easily controllable and occur in reaction to emotions. Many times they last for as short as one-twenty-fifth of a second. <strong>Because these expressions are involuntary muscular movements due to an emotional response, they are nearly impossible to control. </strong>Social engineers use them to notice deception and figure out how the target is really feeling, in order to act accordingly. Another crucial reason is stated by <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Paul_Ekman" data-type="URL" data-id="https://en.wikipedia.org/wiki/Paul_Ekman" target="_blank">Dr. Paul Ekman</a>: <em><strong>If producing the facial expression can cause the emotion, that must mean that our facial movements can affect the emotions we feel, and maybe even the emotions of those around us.</strong></em> Basically, social engineers <strong>practice</strong> producing the facial expressions voluntarily, as it makes it easier to achieve a certain emotional state.</p>



<p class="has-normal-font-size">Let&#8217;s take a look at the <em>microexpressions</em> linked with some basic or biologically universal emotions:</p>



<ul class="has-normal-font-size wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Anger</mark> (one of the easiest to spot): the lips become narrow and tense. The eyebrows slant downward and are pushed together, then the most noticeable characteristic comes into play: the glare.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Disgust</mark>: often characterized by the upper lip being raised to expose the teeth, and a wrinkling of the nose. May also result in both cheeks being raised when the nose is wrinkled up, as if to try to block the passage of the bad smell or thought into one’s personal space.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Contempt</mark>: very strong emotion that is often confused with disgust. <em>Contempt is only experienced about people or the actions of people, but not about tastes, smells, or touches </em>(<a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Paul_Ekman" data-type="URL" data-id="https://en.wikipedia.org/wiki/Paul_Ekman" target="_blank">Dr. Ekman</a>)<em>. </em> Contempt is distinguished by wrinkling the nose and raising the lip, but only on one side of the face, whereas disgust is the raising of the whole lip and the wrinkling of the whole nose.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Fear</mark>: often confused with surprise because the 2 emotions cause similar muscular reactions in the face. The eyes are open wide, the eyebrows are crunched together inward. The lips are pulled together and out towards the ears. Fear can be a big motivator to do many things that you (or your target) would not normally consider doing.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Surprise</mark>: the eyebrows are raised (eyes open wide), the jaw is unhinged and opened slightly.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Sadness</mark>: overwhelming and strong emotion. It can also be very subtle. Mouth is open only slightly, the corners of the lips are down and the cheeks are raised a little. The eyes look down and the eyelids droop. Because we can feel it ourselves when seeing other people expressing this emotion, social engineers use sadness in their advantage <strong>a lot</strong>.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Happiness</mark>. The <strong>true</strong> and the <strong>fake smile</strong> are an important aspect of human expressions to know how to read, and as a social engineer to know how to reproduce. When a person smiles for real, <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Duchenne_de_Boulogne" data-type="URL" data-id="https://en.wikipedia.org/wiki/Duchenne_de_Boulogne" target="_blank">de Boulogne</a> indicates, two muscles are triggered, the <em>zygomaticus major</em> and the <em>orbicularis oculi</em>. He determined that the <em>orbicularis oculi</em> (muscle around the eyes) cannot be triggered voluntarily and that is what separates a real from a fake smile. Therefore, even if recent research indicates some can train themselves to trigger that muscle, more often than not <strong>a fake smile is all about <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">the eyes</mark></strong>. A real smile is broad with narrow eyes, raised cheeks, and pulled-up lower eyelids (it usually involves the whole face, from the eyes to the mouth).</li></ul>



<p class="has-normal-font-size">Showing <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-light-gray-color">genuine</mark> emotions</strong> is known to be a difficult task. One of the tricks actors use to be able to successfully show proper emotion is to remember and focus on a time when they truly felt the emotion they need to portray. Learning to <strong>correctly exhibit</strong> <strong>the subtle hints of</strong> <strong>microexpressions</strong> can cause the neurons in your target’s brain to mirror the emotional state they feel you are displaying, making your target more willing to comply with your request.</p>



<p class="has-normal-font-size">On the other hand, using this knowledge, there are 4 things that can help you detect <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">lies / deceit</mark></strong> in a target:</p>



<ul class="has-normal-font-size wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">contradictions</mark>: watching the person’s microexpressions while you question him about a contradiction is always helpful.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">hesitation</mark>: if you ask a question and the answer should have come quickly from the person, but he hesitates beforehand, it can be an indication that he was using the time to fabricate an answer or to decide whether he wants to reveal some facts.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">changes in behavior</mark>: during a discussion the target may change his behavior every time a certain topic is brought up. Maybe you notice an expression change or a shift in the way he sits, or a marked hesitation. All of these actions can indicate deceit.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">hand gestures</mark>: many professionals state that when someone is being untruthful he will touch or rub his face often. Some psychological connection exists between rubbing the face and generating a fabrication. Taking note of a change in the size, frequency, or duration of hand gestures during different topics in the conversation is important.</li></ul>



<p class="has-normal-font-size"><strong>Why</strong> exactly do social engineers want to detect deceit? If their pretext is someone with authority (manager or department supervisor), and they catch someone lying, they can <strong>use that in their advantage</strong>. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">By &#8220;forgiving&#8221; the person, they are now owed a favor in return.</mark></p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f5e3.png" alt="🗣" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Neurolinguistic</mark> Programming (NLP)</h3>



<p class="has-normal-font-size">NLP was developed in the 1970s by Richard Bandler and John Grinder with the guidance of Gregory Bateson. Without any regulating body, the field grew as everybody wanted to learn to control others, lie without getting caught, or solve all their psychological problems.</p>



<p class="has-normal-font-size">The <strong>new/modern approach</strong> of NLP states that to make a change, the <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">unconscious</mark></strong> mind of the target must be involved, the new behavior must satisfy their original positive intention, and <strong>the change must occur internally, at the state of mind</strong>, rather than at the behavioral level. This new code suggests how NLP can create serious and drastic changes to a person&#8217;s thinking. <br><strong>Example</strong>: increasing your sales by getting someone to start talking about their dreams. Once you have them talking about certain goals or aspirations, you can position your product or service as answering one of the needs to reach those goals. By positively building on your product as fitting a need they have, you give your potential buyer&#8217;s brain a way to connect your product with positive sales. <br>For a social engineer, NLP comes down to using <strong>voice, language, and choice of words to guide people down the path he wants</strong>.</p>



<p class="has-normal-font-size">You can &#8216;inject&#8217; commands into people&#8217;s mind without their knowledge (yes, I know how that sounds), and <strong>the way you say</strong> things is where the injection occurs; it&#8217;s a moment framed within regular conversation. Sometimes <em>how</em> you say something is more important than <em>what</em> you say. Therefore, using the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">tones of your voice</mark> to emphasize certain words in a sentence can cause a person&#8217;s unconscious mind to focus on those words.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">For the next few paragraphs, the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color"><strong>pink, bold</strong></mark> font denotes the words spoken with a <strong>lower</strong> (deep) voice tone. Good social engineers jump between tones very subtly. It&#8217;s an ability that is refined with hours of practice.<br>&#8220;Remember how <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color"><strong>clean your room</strong></mark> looked last Christmas?&#8221; The embedded command is &#8220;clean your room&#8221;, which includes a time shift to a happier time. This is an example of a pleasant, painless injection.<br>“<strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">Buy now</mark></strong>, you can see the <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">benefits</mark></strong>!” This one starts with the voice low, then up to a normal tone, then back down for <em>benefits</em>.</p>



<p class="has-normal-font-size">If you pay close attention <strong>to the way some politicians speak</strong> or <strong>to the voices in commercials</strong>, you&#8217;ll most likely notice this technique. NLP is a powerful topic, and, much like microexpressions, this section only scratched the surface.</p>



<h3 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f937.png" alt="🤷" class="wp-smiley" style="height: 1em; max-height: 1em;" />Interview</mark> &amp; Interrogation</h3>



<p class="has-normal-font-size">The main <strong>difference</strong> between an <em>interview</em> and <em>interrogation</em> is that an interview is in an atmosphere where the target is comfortable both physically and psychologically. In an interrogation the intention is to put some pressure on the target by creating <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">discomfort</mark>, with the goal of gaining a confession or some knowledge the target possesses. Interrogation principles are used widely by successful social engineers. It&#8217;s a skill they&#8217;ll spend a considerable amount of time obtaining.</p>



<p class="has-normal-font-size">When starting an interview or interrogation, areas observed for changes in the subject are: <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">body posture</mark> (upright, slumped, leaning away),  <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">skin color</mark> (pale, red, white), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">head position</mark> (upright, tilted, forward/back), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">eyes</mark> (direction, openness), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">hands/feet</mark> (movement, position, color), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">mouth/lips</mark> (position, color, turned up/down), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">voice</mark> (pitch, rate, changes), <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">words</mark> (short, long, number of syllables, dysfunctions, pauses). Changes can indicate a question or line of questioning that needs more attention. Professionals don&#8217;t watch for only one sign, they <strong>watch for groups of signs</strong>. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><strong>Examples</strong>: defensive posture (the torso is pointing away and the eyes are averting from looking at you), usually appears after asking a question which the target will not answer with the truth. When you feel threatened or scared, your body’s natural reaction is to pull the <strong>elbows</strong> in towards the rib cage. An <strong>increase in</strong> <strong>movement</strong> or “fidgeting” during an interrogation can show an increase in stress levels, signifying that the interrogation is having the desired effect. Blurting out answers quickly is believed to be a sign of practicing the answer. An <strong>open palm</strong> might indicate sincerity.</p>



<p class="has-normal-font-size">Social engineers have to determine what is &#8220;natural&#8221; in a target (i.e. the <em>baseline</em>) very fast. Being very observant is the key to success with this skill. A method of figuring out the baseline involves asking questions that cause the suspect to access different parts of his brain. The interrogator asks <strong>first nonthreatening questions</strong> that require simple memory and questions that require creative thinking. Then looks for outward manifestation of his brain activating the memory center, such as microexpressions or body language cues. This way, he knows what to expect when asking the <strong>real questions</strong>.</p>



<p class="has-normal-font-size"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Theme development</mark> in police interrogations is when the interrogator develops a story to postulate why the suspect may have committed a crime. “<em>So he insulted you and you got so mad, you grabbed the pipe and began hitting his windshield with it.</em>” While the officer is telling the story, he or his partner is watching the body language and microexpressions of the suspect to see if there are any clues that would constitute agreement.</p>



<p class="has-normal-font-size">The <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/United_States_Department_of_Defense" data-type="URL" data-id="https://en.wikipedia.org/wiki/United_States_Department_of_Defense" target="_blank">Department of Defense</a> has different approaches that professional interrogators use, and social engineers have a lot to learn from them.</p>



<ul class="has-normal-font-size wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Direct</mark> approach: The confidence, attitude and manner of the interrogator rules out that the suspect is innocent at all. Without threatening, the interrogator <strong>disarms the suspect by telling him anyone else would have done the same thing</strong>. Social engineers use this if their pretext is a person who has power over the target. They assume the target &#8220;owes&#8221; the response they seek.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Indirect</mark> approach: The suspect is allowed to tell his side of the story in detail and the interrogator looks for omissions, discrepancies, and distortions. The interrogator’s job is to let the suspect know that the best course of action is to tell the truth.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Sympathetic</mark> approach: The interrogator drops his voice and talks in a lower, quieter tone that gives the impression he is an understanding person. He sits close to the suspect and maybe puts his hand on the suspect’s shoulder or pats him on the arm. Physical contact at the right time is very effective.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Emotional</mark> approach: It <strong>plays on the morals or emotions</strong> of the suspect. Questions such as, “What will your wife or kids think about this?” are used. The thoughts that are aroused emotionally upset him and make him nervous. As these emotions manifest themselves, the interrogator can capitalize on them.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Logical</mark> approach: This non-emotional approach presents strong evidence of guilt. The interrogator should sit erectly and be business-like, displaying confidence.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Indifferent</mark> approach: The interrogator <strong>acts as if he does not need the confession</strong> because the case is solved. At that point the interrogator may try manipulating the suspect into giving his side of the story. Social engineers use this when they&#8217;re caught in an area or situation they should not be in, by acting indifferent instead of afraid that they&#8217;ve been caught. It can cause the person who caught them to not be alarmed as much and afford them an opportunity to dispel any worries.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Face-saving</mark> approach: The interrogator should rationalize the offense, giving the suspect a way out and an excuse to confess and save face.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Egoistical</mark> approach: It&#8217;s all about pride. For it to work you need a suspect who is very <strong>proud</strong> of an accomplishment. Bragging on good looks, intelligence, or the way the crime was performed may stroke his ego enough that he wants to confess to show that, indeed, he was that smart. <br>Playing up someone’s accomplishments gets them <strong>to spill their deepest secrets</strong>. In the case of a U.S. nuclear engineer visiting China, social engineers loaded the man with compliments, and he <em>spilled the beans</em> and divulged information he shouldn’t have.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Exaggeration</mark> approach: If an interrogator <strong>overexaggerates</strong> the case facts, the suspect may admit to what was real. Social engineers use this approach by overexaggerating the task they are there to perform. By overexaggerating the reason for being there you can give the target a reason for providing you lesser access. <strong>Example</strong>:  “I know Mr. Smith wanted me to fix his computer personally because he lost a lot of data, but if you don’t feel comfortable with that, I can potentially fix his problem from another computer in the office.”</li><li>Also, a suspect <strong>rarely confesses his transgressions all at once</strong>. Getting him to make <strong>minor admissions</strong>, such as he was on the site, owned the weapon in question, or owned a similar car, can move him toward admitting more and more, eventually leading to a complete confession.</li></ul>



<p class="has-normal-font-size"><strong>Gesturing</strong> is often used to get better answers in these situations. There are techniques like <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color"><strong><em>anchoring</em></strong> </mark>(linking statements of a type with a certain gesture, e.g. positive with right hand movement, negative with left hand movement), or <em><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">mirroring</mark></strong></em> where you try to match your gestures to the personality of the target. Mirroring not only involves mimicking a target’s body language but also using gestures that make it easy for a person to listen to you. Seeing gestures a target is familiar with can be comforting to him or her.</p>



<p class="has-normal-font-size">Finally, if you want to know <strong>how far</strong> some people can go for the sake of &#8220;interrogation&#8221;, take a look at <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">C.I.A.</mark>&#8216;s <a href="https://en.wikipedia.org/wiki/Project_MKUltra" data-type="URL" data-id="https://en.wikipedia.org/wiki/Project_MKUltra" target="_blank" rel="noreferrer noopener">Project MK-Ultra</a>. You won&#8217;t be disappointed <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> .</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1fac2.png" alt="🫂" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Building</mark> Instant Rapport</h3>



<p class="has-normal-font-size">Basically, it&#8217;s the ability to make friends with someone in a matter of minutes, and it is a vital skill for social engineers. <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Rapport" data-type="URL" data-id="https://en.wikipedia.org/wiki/Rapport" target="_blank">Wikipedia</a> defines <strong>rapport</strong> as being &#8216;in sync&#8217; with, or being &#8216;on the same wavelength&#8217; as the person with whom you are talking. So, <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">how does a social engineer build rapport</mark></strong>?</p>



<ul class="has-normal-font-size wp-block-list"><li>he <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">likes people</mark></strong> and enjoys interacting with them. People can see through fake smiles and fake interest, and they need to feel you are genuinely concerned to build that trust relationship.</li><li>he takes care with his <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">appearance</mark></strong>: clothing, body odor, cleanliness, movements, facial expressions. He adapts all these factors to the target (using information that was gathered about their preferences). Also, “if a person is not comfortable with himself, others will not be comfortable with him either.&#8221;</li><li>he&#8217;s a <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">good listener</mark></strong>. He realizes a major difference exists between <em>hearing</em> and <em>listening</em>. It&#8217;s commonly believed that people retain much less than 50% of what they hear. <br>He <strong>pays attention</strong>, does not fiddle with the phone or other gadget, <strong>does not interrupt</strong>, and tries hard <strong>not to think ahead and plan his next response</strong>. If you are planning your next response, you will not be focused, and you may miss something important, or give the target the impression you don’t really care.<br>He doesn&#8217;t forget to <strong>smile</strong> and <strong>provide proof</strong> that he&#8217;s listening, by nodding (once in a while) and rephrasing some of the ideas of the target.<br>He <strong>doesn&#8217;t always let his personal beliefs and experiences filter the message</strong> coming his way. If he does that, he may not truly &#8220;hear&#8221; what the speaker is saying.</li><li>he <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">keeps the conversation off himself</mark></strong>. We all love to talk about ourselves &#8211; it is human nature. So, he lets the target talk about herself until she gets tired of it (you&#8217;d amazed at how much information they release); he&#8217;ll be deemed an &#8220;amazing friend&#8221;, &#8220;a “perfect husband&#8221;, or whatever title he&#8217;s seeking.</li><li>he tries to <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">identify and understand the underlying emotions</mark></strong>, then uses reflection skills to make the person feel as if he&#8217;s really in tune with him. Nothing builds rapport more than when people feel like <strong>you</strong> “<strong>get them</strong>.”</li><li>he&#8217;s <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">curious</mark></strong> and he has a strong <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">general knowledge</mark></strong>. <em>Knowledge is power</em>, right? It makes you interesting and gives you something to base a conversation on. Also, when you become curious about others’ lifestyles, cultures, and languages <strong>you begin to understand what makes people &#8216;tick&#8217;</strong>.</li><li>he&#8217;s <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">open minded</mark></strong> enough to look into another&#8217;s thoughts on a topic, even if those thoughts differ from his. This keeps you from being rigid and unbending in your personal judgments. You may not personally agree with certain topics, beliefs, or actions but if you can remain nonjudgmental, then you can approach a person by trying to understand why he is, acts, or portrays a certain way.</li><li>he finds ways to <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">meet any of the 4 fundamental psychological needs</mark></strong> for humans (stated by <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/William_Glasser" data-type="URL" data-id="https://en.wikipedia.org/wiki/William_Glasser" target="_blank">Dr. William Glasser</a>): <br>&#8211;  belonging/connecting/love<br>&#8211;  power/significance/competence<br>&#8211;  freedom/responsibility<br>&#8211;  fun/learning<br>If you can create an environment to provide those needs for people, you can create bonds that are <strong>unbreakable</strong>. You just have to look at how successful social media platforms have become, and how hard it is to let them go. It&#8217;s because they are environments that mainly satisfy needs like <strong><em>belonging/connecting</em></strong> and <strong><em>fun</em></strong>.</li></ul>



<p class="has-normal-font-size">Using these rapport-building techniques as well as matching energy levels, facial expressions, and the like, he can build strong rapport on a <strong>subliminal level</strong>.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">Let&#8217;s take a <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-yellow-color">police interrogation example</mark> that proves this point about the <strong>power of rapport</strong> to make people comply with requests. The officers had arrested a man who was a <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">peeping tom</mark>. He had a fetish where he loved to invade the privacy of women who wore pink cowboy boots. The agent, instead of judging him for the freak he is, used phrases like, “<em>I like the red ones myself</em>,” and “<em>I saw this girl the other day wearing short shorts and high cowboy boots, wow!</em>” After just a short time he began to relax. Why? He was <strong>among like-minded people</strong>. He <strong>felt</strong> <strong>connected, part of the crowd</strong>. Their comments put him at ease and he began to spill his guts about his “habits.”</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/26a0.png" alt="⚠" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">The Human</mark> Buffer Overflow</h3>



<p class="has-normal-font-size"><em>Buffer overflow</em> is a well known vulnerability in the world of <strong>software</strong> security. Simply put, a <em>buffer</em> is a space (usually of fixed size) given for something to happen or to hold data. <br>If the program <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">does not properly check</mark> the &#8216;limits&#8217; of a <em>buffer</em>, a hacker can overload it with data until the program <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">crashes</mark>, or, a part of that data <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">fills a memory zone <strong>next to</strong> that buffer</mark>. If that adjacent memory zone happens to be a place where the program <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">looks for instructions</mark> to execute, then it can execute instructions given by the hacker. <a rel="noreferrer noopener" href="https://www.slanglang.net/memes/big-oof/" data-type="URL" data-id="https://www.slanglang.net/memes/big-oof/" target="_blank">Oof</a>.</p>



<p class="has-normal-font-size">Well, it looks like this can also be applied to the human mind. If a certain dataset does not fit the space we have for it, what happens? Unlike a computer, your brain doesn’t crash, but <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">it does open up a momentary gap that allows for a command to be injected</mark> so the brain can be told what to do with the extra data. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size">The <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">simplest example</mark></strong> of this is having color names written using another color. We&#8217;ve all been through this:  <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">YELLOW</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-medium-gray-color">BLUE</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">ORANGE</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-blue-color">BLACK</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-gray-color">RED</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-white-color">GREEN</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-yellow-color">PURPLE</mark> <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">YELLOW</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">GREY</mark> <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">GREEN</mark>. As fast as you can, try to read the <strong><em>color</em></strong> of the word, <strong>not</strong> what the word spells. <br>After a couple of fast reads and struggles (which means a lot of data to process at once) you&#8217;ll <strong>read the word and not the color</strong>. The data &#8216;overflow&#8217; made the command injection possible, as our mind is <strong>not</strong> good at concentrating on 2 things at the same time.</p>



<p class="has-normal-font-size">Social engineers understand how we make decisions in life, in order to perform such buffer overflows. People make most of their decisions <strong>subconsciously</strong>, including how to drive to work, get coffee, brush their teeth, and what clothes to wear without really thinking about it. The goal is to bypass the &#8220;<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">firewall</mark>&#8221; (the conscious mind) and gain access directly to the &#8220;<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">root of the system</mark>&#8221; (the subconscious). This is done with <strong><em><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Embedded Commands</mark></em></strong>, which are usually <strong>short</strong> (3 or 4 words), <strong>hidden in normal sentences</strong>, and <strong>accompanied by facial/body language</strong>. <br><strong>Examples</strong>: In marketing / commercials, some<strong> information</strong> is presented first (studies, reviews, functionalities etc.). This information is usually <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">intriguing</mark></strong> and <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">stimulates the imagination</mark></strong> of the target, thus, the <strong><em>conscious mind</em> stops</strong> to process it. This is quickly followed by words like: &#8220;Buy now!&#8221;, “Act now!”, “Follow me!” (<em>the <strong>commands</strong></em>, targeting the subconscious).</p>



<p class="has-normal-font-size"><strong>When</strong> a social engineer applies this method <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">directly</mark> (i.e. live, during dialog),<strong> while</strong> <strong>the conscious</strong> mind is connecting the dots, so to speak, the <strong>unconscious</strong> mind has little option but to <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">comply</mark> if an embedded command exists. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size">An <strong>example</strong> (<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-blue-color">from personal experience</mark>) is the scammer from big cities (<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-dark-blue-color">I found this one in Rome, he was from Africa</mark>) who builds rapport with random tourists and gives them bracelets (apparently for free). But, when the tourist tries to leave, this &#8220;friendly guy&#8221; becomes serious, and starts telling emotional stories about how his family struggles to live, demanding some money &#8220;to help them&#8221;. Because the tourist was given the bracelet, he&#8217;ll most likely feel that he needs to give something in return (there also a fear of &#8216;bad vibes&#8217;). So, instead of giving the bracelet back (which, btw, the scammer refuses to take back), the tourist takes his money out (<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">the worst mistake you can make in this context</mark>). <br>Up to this point, there&#8217;s no <em>buffer overflow</em>, but now, when this scammer sees the (not so modest) amount of cash you have, he decides to go for this <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">dirty </mark>technique. If the tourist tries to hand him a small bill (only 5€ let&#8217;s say), he quickly takes his money out, and starts to talk a lot of words in a very broken English, from which only the word &#8216;<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">change</mark>&#8216; can be understood. While holding his money, he continuously repeats these words, faster and faster (this is the data that overflows your <em>conscious</em> mind &#8211; you start thinking what the hell is he actually saying), and among them, the only word you can somehow discern is still &#8216;<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">change</mark>&#8216; (<strong>the command to be injected</strong>). So, guess what: you&#8217;ll take out a much bigger bill and you&#8217;ll hand it to him, thinking that he only wants to change the money <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-gray-color">(changing money is a well known, familiar &amp; legit procedure to our subconscious)</mark>&#8230; He takes it, and gives you only a much smaller bill in return (that is, if you&#8217;re lucky). And that&#8217;s it. He&#8217;ll continue with the same broken English, while getting away from there, leaving the tourist still processing the situation. <br>Believe it or not, they make enough money to live a decent life (for some time) with this stupid trick, in big cities (Paris, Rome, Barcelona, Lisbon a.s.o.). However, there&#8217;s people who play with these scammers, to harass them back, like <a rel="noreferrer noopener" href="https://youtu.be/wxjM2fcHmS8" data-type="URL" data-id="https://youtu.be/wxjM2fcHmS8" target="_blank">this guy</a>. Sometimes, catching them becomes fun :)) .</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Influence</mark>: the power of persuasion</h3>



<p class="has-normal-font-size">This is the process of getting someone else to <em><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">want</mark></em> to do, react, think, or believe in the way <em>you</em> want them to. True influence is <em>elegant</em> and <em>smooth</em>, and most of the time undetectable to those being influenced. After reading this section, you&#8217;ll start to get irritated at the shoddy attempts of marketing people and, if you are like me, you will begin to rant and rave at terrible commercials and billboards (they are fuckin&#8217; everywhere).</p>



<p class="has-normal-font-size">Let&#8217;s take a look at some <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">influence tactics</mark>, shall we?</p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Reciprocation</mark></h4>



<p class="has-normal-font-size">It&#8217;s the simple principle of &#8220;you do something for me, I do something for you&#8221;. Simple <strong>example</strong>: I hold the door open for you first, and most likely you&#8217;ll hold the next door open for me. This rule is important because often the returned favor is <strong>done</strong> <strong>unconsciously</strong>, and it is seen as part of the moral codes.<br>Politicians are influenced in much the same way. It is no secret that many times politicians or lobbyists are more favorable to people who helped their political campaign than those who did not.</p>



<p class="has-normal-font-size">Social engineers give something away, and that thing must have value &#8211; to the recipient. The more value the gift has and the more unexpected it is, the greater the sense of indebtedness.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">An<strong> example</strong> is, of course, negotiation. The seller starts with a big price, the buyer with a much smaller offer. <strong>Gradually</strong>, each of them gives up a part of the possible earning, <strong>one by one</strong>, until they reach a deal (reciprocation/concession: if the seller dropped the price this much for me, I can give him a little more).<br>Children can use this trick when demanding money from the parents. If they need 5€, but they start by asking for 30, then 20, it is more likely they&#8217;ll end up with 5 or even 10. </p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Scarcity</mark></h4>



<p class="has-normal-font-size">People often find objects and opportunities more attractive if they are<strong> rare</strong>, scarce, or hard to obtain. This is why you will see ads filled with “<strong>Last Day</strong>”, “<strong>Limited Time Only</strong>”, “<strong>Only 3-Day Sale</strong>”, &#8220;<strong>The first X users will get Y discount</strong>&#8221;  and “<strong>Going Out of Business Forever</strong>” messages that entice people to get a share of the soon-to-be-never-seen-again product. In economy, the rarer the resource, the higher the perceived value the object retains (e.g., gold). Social events can often appear to be more exclusive if scarcity is introduced. <br>Some <strong>dating</strong> advice for men is based on this concept as well. One might act like he&#8217;s very busy on a regular basis, and free time is hard to come by. For this reason (especially if he&#8217;s built a good reputation), this man can be seen as of high value. In lots of cases, women feel much more attracted to this kind of man, also because he <strong>does not </strong>give them <em><strong>attention</strong></em> or <em><strong>validation</strong></em>, like the <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">majority</mark></strong> of men do (by approaching &amp; flirting with them). So, in order to get her <strong>validation </strong>from this man as well, an <em>attractive</em> woman will most likely do the 1<sup>st</sup> step in the game of seduction. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-gray-color">From personal experience, I can tell you that this is some pretty good advice, but it requires a lot of self control, self love, and self confidence.</mark><br>For a social engineer, using scarcity mixed with other principles can also make the attack even deadlier. Either way, <strong>scarcity creates a desire</strong> and that desire can lead someone to making a decision he might regret later.</p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Authority</mark></h4>



<p class="has-normal-font-size">People are more willing to follow the directions or recommendations of someone they view as an authority. Therefore, social engineers may impersonate persons with:<br>&#8211;  <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">legal</mark> authority: law enforcement, security guards, lawyers;<br>&#8211;  <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">organizational</mark> authority: CIO or acting as sent or authorized by the CFO;<br>&#8211;  <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">social</mark> authority: refers to &#8216;natural-born leaders&#8217; of any social group. In Western countries, there are 3 <em>authority symbols</em> : titles, clothes, automobiles. Using the right combination of these and an <strong>assertive</strong> attitude when approaching the target, a social engineer can easily <strong>intimidate</strong> him/her. </p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><strong>Example</strong>: in <a rel="noreferrer noopener" href="https://youtu.be/qHTgt82ZGPM?t=1080" data-type="URL" target="_blank">the BOR Recorder investigation</a>, an <strong>expensive car</strong> (w/ the clothing) gives the &#8216;<strong>respected</strong>&#8216; status to the undercover journalist, whose pretext is a politician who wants to do business with the church.</p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Commitment &amp; Consistency</mark></h4>



<p class="has-normal-font-size">People value consistency in others, and they also want to appear consistent in their own behavior. If a social engineer can get a target to commit to something small (an act or a simple “yes”), usually escalating the commitment is not too hard. <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Robert_Cialdini" data-type="URL" data-id="https://en.wikipedia.org/wiki/Robert_Cialdini" target="_blank">Robert Cialdini</a> states: &#8220;(&#8230;) once we make a decision, we will experience pressure from others and ourselves to behave consistently with that decision. You can be pressured into making either good or bad decisions depending on your past actions&#8221;.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">Simple <strong>example</strong> &#8211;  a phone conversation often used by solicitors goes something like this: <br>“Hello, how are you today?” You answer, “I am doing great.” Now, the exploit: “That is good to hear, because some people who are not doing so great can use your help.” <br>You can’t really go back on what you said now, because you are still doing great and committed to it.</p>



<p class="has-normal-font-size">Being aware that it is okay to say “<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">no</mark>” can save you from committing to something that could be disastrous. Yet sometimes we convince ourselves that saying “no” is some form of cardinal sin that needs many prayers to be forgiven.</p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Liking</mark></h4>



<p class="has-normal-font-size">Other than making themselves liked at the psychological level, social engineers take into consideration their <strong>physical attractiveness</strong> as well. Humans tend to automatically “like” those who we find attractive. As vain as that sounds, it is the truth. Some serious psychological principles back up this idea.</p>



<p class="has-normal-font-size">The “<a rel="noreferrer noopener" href="https://psycnet.apa.org/record/1973-09160-001" data-type="URL" data-id="https://psycnet.apa.org/record/1973-09160-001" target="_blank">What Is Beautiful Is Good</a>” study proved that people tend to link beauty with other successful qualities and it<strong> alters their opinions and ability to trust</strong> someone. This effect is often used in marketing. <em>Beautiful</em> people are given products to drink, eat, and wear, and other people will automatically assume these things are good.</p>



<p class="has-normal-font-size">A good social engineer knows the target (how does he dress, what does he consider bad and good) so he/she can successfully <strong>look</strong> the way the target would expect. The social engineer will project a <strong>confident and positive</strong> attitude, will <strong>look for things to compliment</strong> people on, and will wear clothing, hairstyles, jewelry, makeup that won&#8217;t shock, surprise, or disgust anyone. <br><strong>Smart compliments</strong> tend to reinforce a target’s self image, making him feel as if you have a greater-than-normal understanding of him.</p>



<h4 class="wp-block-heading"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Consensus / Social Proof</mark></h4>



<p class="has-normal-font-size">Social proof is a psychological phenomenon that occurs in social situations when people are unable to determine the appropriate mode of behavior.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size"><a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Robert_Cialdini" data-type="URL" data-id="https://en.wikipedia.org/wiki/Robert_Cialdini" target="_blank">Dr. Robert Cialdini</a> states in one of his books: “Social proof—people will do things that they see other people are doing. For example, in one experiment, one or more confederates would look up into the sky; bystanders would then look up into the sky to see what they were seeing. At one point this experiment is aborted, as so many people were looking up that they stopped traffic.”<br>“One means we use to determine what is correct is to find out what other people think is correct…<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">We view a behavior as more correct in a given situation to the degree that we see others performing it</mark>.”</p>



<p class="has-normal-font-size">Social proof is not just influenced by large groups, but also by <strong>high-profile individuals</strong>. For instance, a single celebrity becoming associated with a product will make others want to be associated with the celebrity’s positive traits, and they will then use the same product.</p>



<p class="has-normal-font-size">A social engineer uses this principle to stimulate a person’s compliance with a request by informing him or her that <strong>many other individuals</strong>, perhaps some who are role models, took the action or behavior you are trying to get this person to do. He uses social proof <strong>under 2 conditions</strong>: <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">uncertainty </mark>(when people are unsure and the situation is ambiguous, they are more likely to observe the behavior of others and accept that as being correct) and <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">similarity</mark> (people are more inclined to follow the lead of others who are similar to themselves).</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f3de.png" alt="🏞" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Altering</mark> Reality: Framing</h3>



<p class="has-normal-font-size"><strong>Framing</strong> is your own personal experiences and the experiences of others that you allow into your conscious mind to alter the way you make decisions. Basically, anything that can alter people’s perceptions can be called framing.</p>



<p class="has-normal-font-size">You can see simple examples of this when inspecting grocery store products. On many of them it&#8217;s written that they contain <strong>25%</strong> of some <em>good stuff</em> instead of <strong>75%</strong> of the <em>bad stuff</em>.<br><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">Simply presenting the facts in a different way can make something that would normally be considered bad,seem good.</mark> Hence, framing has long been used in politics.</p>



<p class="has-normal-font-size">Our minds are designed to not like “clutter” or chaos. When presented with<strong><em> frames </em></strong>that are cluttered (e.g. images with optical illusions), our brains will try to make order out of them. Your mind will insist on finding familiar patterns in things. We do it in clouds, space, and inanimate objects. Humans also tend to see faces in these things. <strong>Example</strong> &#8211; just take a look at texts like this: <em>O lny srmat poelpe can raed tihs.</em> The fact that you easily read it has to do with the brain trying to make order out of chaos, by default.</p>



<p class="has-normal-font-size">Many times <strong>companies will use subtle measures of framing to plant an idea</strong>. They know that logic convinces someone an action is good to take, but <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">emotion</mark></strong> is what makes the action happen.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">E.g. in logos: in the <strong>FedEx</strong> logo you can also see an arrow (frame between &#8216;E&#8217; and &#8216;x&#8217;); in the <strong>Amazon</strong> logo, the arrow can be seen as a smile, which connects &#8216;a&#8217; to &#8216;z&#8217; (the frame is that Amazon has everything, and it makes you happy).<br>In an <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">expensive clothing store</mark></strong>—when you walk in, everything is hung neatly, pressed, and perfect. The items are <strong>evenly spaced</strong> and in <strong>little amount</strong>. The perception can be that the clothing is worth the exorbitant price.</p>



<p class="has-normal-font-size">Social engineers know that a frame is a <strong>conceptual structure</strong> that our minds use in thinking. So, their goal is either to <strong>create a new frame</strong>, <strong>align with a person’s frame</strong>, or <strong>bring the target into their frame</strong>. However, people tend to overlook frames or proposed frames if a link does not exist to a <strong>core belief</strong> or a <strong>value</strong> of their belief system.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">E.g.: <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Vladimir Putin</mark>&#8216;s regime frame about Ukraine. It&#8217;s strongly connected to events of <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/World_War_II" data-type="URL" data-id="https://en.wikipedia.org/wiki/World_War_II" target="_blank">WW2</a> when Russians fought &amp; defeated the <strong><a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Nazi_Germany" data-type="URL" data-id="https://en.wikipedia.org/wiki/Nazi_Germany" target="_blank">Nazis</a></strong> (in their attempt to conquer some of Russia), who were seen as the <strong>worst people on the planet </strong>(there were reasons for that ofc). Since then, this win is a <strong>crucial event</strong> for Russia (even transformed in <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">propaganda</mark>) and is intensively thought as one of the most important history lessons in Russian schools. Now, because defeating Nazis turned into a<strong> national <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">value/core belief</mark></strong> there, the frame that Ukraine has to be &#8220;eliberated&#8221; and &#8220;de-nazificated&#8221; is used by Putin, and, if you pay close attention, there still are a lot of Russians who <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">believe him</mark>.</p>



<p class="has-normal-font-size">Because our minds work by picturing things, social engineers use words which are descriptive and robust (&#8220;imagine <em>this</em> and <em>that</em>&#8220;). They deliver stories that cause the target to picture the frame they want, while involving him emotionally. After planting the idea, they may repeatedly cause the target to think about the frame, as this reinforces it tremendously.</p>



<p class="has-normal-font-size">You can learn a lot from looking at how <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">media</mark> utilizes this skill. By using omissions, or leaving out details of a story or the whole story itself, the media can lead people to a conclusion that seems like their own, but really is the media’s. This method is effective because it <strong>bends the truth</strong> but not so much that it becomes false, so it remains believable.</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f608.png" alt="😈" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Manipulation</mark>: Controlling Your Target</h3>



<p class="has-normal-font-size">The aim of manipulation is to overcome the <strong>critical thinking</strong> and <strong>free will</strong> of the target. The social engineer doesn’t want to alert the target he is being manipulated. <br>Some of the following methods may be very controversial and downright horrible, but they are used each day by scammers, identity thieves, and the like. One of the goals can be to create <strong>anxiety</strong>, stress, and undue <strong>social pressure</strong>. When a target feels that way he is more likely to take an action that you want him to take.</p>



<p class="has-eighty-black-background-color has-background has-small-font-size">Simple but innocent <strong>example</strong>: <strong>diverting the target’s attention</strong> to something other than the problem at hand can give you enough time to finish your job (until he realizes what is actually happening). For instance, if you are caught by a security guard, <strong>instead of getting nervous</strong>, you could simply look at him with confidence and say: “Do you know what I am doing here? Did you hear that some USB keys have been lost with very important data on them? It is imperative we find them before everyone comes in tomorrow. Do you want to check the bathrooms?”</p>



<p class="has-normal-font-size">Manipulation is used in <strong>6 ways</strong> that hold true whether the topic is brainwashing or something less insidious. You shouldn&#8217;t fancy the details, but I know you want them. Here you are.</p>



<ol class="has-normal-font-size wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Increasing the suggestibility </mark>(i.e. the desire to cooperate)<mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color"> of the target</mark>. It can involve using NLP skills (discussed previously) or other visual cues. A social engineer can make sure the whole setup is geared towards his target &#8211; the phrases used, the word pictures painted, the clothing <a rel="noreferrer noopener" href="https://www.verywellmind.com/color-psychology-2795824" data-type="URL" data-id="https://www.verywellmind.com/color-psychology-2795824" target="_blank">colors</a> chosen to wear. Knowing his <em>likes</em>, <em>dislikes</em>, <em>kids’ names</em>, <em>favorite teams</em>, and <em>favorite foods</em>, and then using this to create an <strong>emotional environment</strong> will bring great results. At its most extreme, sleep or food deprivation increases suggestibility the fastest.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Gaining control over the target’s environment</mark>. Can involve everything from <strong>controlling the type and quantity of information</strong> to which a target has access, to much subtler things like gaining access to a target’s social media websites. Being able to use <strong>social networks</strong> to find out what triggers they have is a powerful skill.<br>Good social engineers locate the target&#8217;s social circles, whether online or in the real world, and spend time planning how to get in and control that environment. <em>How?</em> Well, they again take time to <strong>build relationships</strong> in there, and <strong>gather information</strong> before the final blow is administered.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Creating doubt</mark>/ forcing the target to reevaluate. This one is very <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">negative</mark> because it&#8217;s used to make someone doubt what he/she has been told (most probably for years) to be <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">true</mark>. It&#8217;s basically destabilizing and undermining his/her belief system. <br>A manipulator makes his victim question the rules they follow, their job, or any other belief, in order to affect her ability to make rational decisions. <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Cults</mark></strong> use this tactic to prey upon those looking for guidance through life. Many times, people who feel lost or confused are convinced that their whole belief system needs to be reevaluated. When the cults have control they can be so credible that the victims can be thoroughly convinced that their family and friends do not know what is best (e.g., in recent years we&#8217;ve seen <a rel="noreferrer noopener" href="https://www.visionofhumanity.org/can-economic-conditions-explain-flow-foreign-fighters-isis/" data-type="URL" data-id="https://www.visionofhumanity.org/can-economic-conditions-explain-flow-foreign-fighters-isis/" target="_blank">people leaving civilized countries to join ISIS</a>). <br>Social engineers usually apply this concept by <strong>presenting well-thought-out questions</strong> that can cause the target to reevaluate his stand on a topic and cause him to falter.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Creating a sense of powerlessness</mark>. Very dark, but effective tactic. <br>To make a target feel a lack of confidence in her convictions, a social engineer presents &#8220;facts&#8221; he &#8220;received&#8221; from someone with authority, known by the victim. On the other hand, if his pretext is someone with power, he can act angry by the <strong>lack of response</strong> or the inability of the target to give <strong>quick answers</strong>. In this context, the social engineer also threatens his victim, causing her to doubt her position and feel loss of power. If the victim cannot take time to think about how to handle a problem, she must take a decision in a way she knows she shouldn&#8217;t. </li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Creating strong emotional responses in the target</mark>. That includes everything from doubt to guilt to humiliation and more. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">If the feelings are intense enough, they can cause the target to alter their whole belief system.</mark> <br>Social engineers usually create an emotional response based on <strong>fear</strong>, <strong>loss</strong>, or <strong>punishment</strong>. In that context, a target might possibly do anything to &#8220;regain favor&#8221;.</li><li><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Heavy intimidation</mark>. Of course, fear of physical pain or other dire circumstances can be used to make a target crack under pressure. Social engineers <strong>won&#8217;t</strong> <strong>go</strong> this route unless they are using corporate espionage as a tactic. They&#8217;ll use perceived authority to build strong fear and feelings of potential loss, by suggesting that failure to comply can lead to being laid off or other adverse consequences.<br>Looking busy, upset, and on a mission can intimidate many. Talking with very authoritative expressions can also intimidate people.<br>An <strong>experienced</strong> social engineer does not allow his emotions to get involved, and always <strong>assumes</strong> that the target will act the way he wants (by answering the way he wants, by granting all his requests). He knows that assuming what he wants will occur is a strong point, because it affects his <strong>mental outlook</strong>. <strong>The belief that you&#8217;ll get what you came for will create a new body language and facial expressions that will feed your pretext perfectly</strong>.</li></ol>



<p class="has-normal-font-size">But, how about using <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-bright-pink-color">positive manipulation</mark></strong>? <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-yellow-color">The difference is that the target doesn&#8217;t need therapy when you are done</mark> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /> . This is useful in educating children, in convincing people to stop smoking or in making someone take up a good habit.</p>



<h3 class="wp-block-heading"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f3c1.png" alt="🏁" class="wp-smiley" style="height: 1em; max-height: 1em;" /><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">Concluding</mark> remarks</h3>



<p class="has-normal-font-size">Let&#8217;s finish with some critical points about why <strong>all</strong> this <em>madness</em> usually works.</p>



<ul class="has-normal-font-size wp-block-list"><li>people are designed to be <strong>trusting</strong>, to have levels of <strong>compassion</strong>, <strong>empathy</strong>, and a <strong>desire to help</strong> others</li><li>most of us are not aware or do <strong>not realize the scale</strong> of the danger. <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">Only when you know how the “criminal” thinks, and only when you are ready to look that evil in the eye and embrace it, can you truly protect yourself.</mark></li><li>you can throw money into intrusion detection systems, firewalls, antivirus programs, and other solutions to maintain perimeter security. With social engineering no software systems exist that you can attach to your employees or yourself to remain secure.</li><li><strong>companies tend to fear change</strong>. That&#8217;s why many of them fall behind with software updates and even mindset updates.</li><li>when information is perceived as having no or little value, then little effort is placed on protecting it. You must <strong>realize the value</strong> of the data that you have and be aware of a tactic a social engineer might use <strong>to reduce the value</strong> <strong>of this information in your eyes</strong>.</li></ul>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:33.33%">
<hr class="wp-block-separator"/>



<p class="has-text-align-right has-small-font-size">In the end, I&#8217;ll leave you with one of the most &#8216;fun&#8217; Social Engineering presentations out there.<br> <br><em>Good luck.</em></p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:66.66%">
<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="TEDxSanAntonio - Brian Brushwood - Social Engineering - How to Scam Your Way into Anything" width="1440" height="810" src="https://www.youtube.com/embed/yY-lMkeZVuY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
</div></figure>
</div>
</div>



<p class="has-text-align-center has-extra-small-font-size">Publications used for this article:<br><br><em>Social Engineering: The Art of Human Hacking</em> &#8211; Christopher Hadnagy<br>www.social-engineer.com</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vital urban warfare knowledge</title>
		<link>/2022/02/28/vital-urban-warfare-knowledge/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 23:46:03 +0000</pubDate>
				<category><![CDATA[War]]></category>
		<category><![CDATA[combat]]></category>
		<category><![CDATA[urban]]></category>
		<guid isPermaLink="false">/?p=323</guid>

					<description><![CDATA[26/02/2022: Ukraine&#8217;s president announced that anyone in the world can volunteer in the front line of defense of the country.<p><a href="/2022/02/28/vital-urban-warfare-knowledge/" class="more-link">Continue reading<span class="screen-reader-text">Vital urban warfare knowledge</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover" style="min-height:366px;aspect-ratio:unset;"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img loading="lazy" decoding="async" width="2400" height="1600" class="wp-block-cover__image-background wp-image-324" alt="combat" src="/wp-content/uploads/2022/02/daniel-stuben-VMXXvU1oKw8-unsplash.jpg" style="object-position:49% 49%" data-object-fit="cover" data-object-position="49% 49%"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-white-color has-text-color has-small-font-size" style="font-style:normal;font-weight:400"><strong><em>War is 90% information</em>. </strong></p>



<p class="has-text-align-center has-white-color has-text-color has-small-font-size" style="font-style:normal;font-weight:400">Napoleon Bonaparte</p>
</div></div>



<hr class="wp-block-separator is-style-default"/>



<p class="has-text-align-center">26/02/2022: Ukraine&#8217;s president announced that <em><strong>anyone in the world</strong></em> can volunteer in the front line of defense of the country. <br>The <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">problem</mark> is that most of these <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">individuals</mark> and <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">civilians</mark> lack military background or battlefield experience. <br>This article can serve as a starting guide for urban combat and for survival. <br>I also had hopes that nobody, especially in Europe, would ever need such information. <br>But here we are.</p>



<h4 class="wp-block-heading">Some important notes beforehand</h4>



<ul class="wp-block-list"><li>I always try to remain unbiased and provide impartial &amp;<mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">useful</mark>information</li><li>if there is anything that should be changed or added here, you can contact me (I&#8217;m open to suggestions)</li><li>the <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Russo-Ukrainian_War" data-type="URL" data-id="https://en.wikipedia.org/wiki/Russo-Ukrainian_War" target="_blank">war between Russia &amp; Ukraine</a> is not new, it has been going on since 2014 (I see a lot of people finding out only now)</li><li>I have been following this conflict since 2018, when it was only a cyberwar, as it implied some of the most sophisticated hacks and vulnerabilities at the time (NSA related). Here is a list of the cyberattacks: <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Russian%E2%80%93Ukrainian_cyberwarfare" target="_blank">https://en.wikipedia.org/wiki/Russian%E2%80%93Ukrainian_cyberwarfare</a></li><li>if you want a pretty good explanation for <strong>why</strong> is all of this happening, you can find it here: <a rel="noreferrer noopener" href="https://youtu.be/If61baWF4GE" target="_blank">https://youtu.be/If61baWF4GE</a></li><li>always inform yourself from sources that verify (or at least discuss) the veracity of the information before posting it, like <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/2022_Russian_invasion_of_Ukraine" data-type="URL" data-id="https://en.wikipedia.org/wiki/2022_Russian_invasion_of_Ukraine" target="_blank">Wikipedia</a></li><li>most of the tips enlisted here are from a former <a rel="noreferrer noopener" href="https://www.marines.com/" data-type="URL" data-id="https://www.marines.com/" target="_blank">U.S. Marine</a> with extensive fighting experience in <strong>Iraq</strong>, who chose to remain anonymous</li><li>the current offensive in Ukraine is the biggest mistake I have ever witnessed. What I can say for sure, related to a possible <strong>happy ending</strong>, is that the <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Kremlin</mark> should be <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-blue-color">mature</mark></strong> enough to: <br>&#8211;  admit its mistakes and stop the offensive immediately<br>&#8211;  accept help from the rest of the world to rebuild its democracy and Russia&#8217;s economy</li></ul>



<h4 class="wp-block-heading">Until then, the tips &#8230;</h4>



<ol class="has-yellow-color has-black-background-color has-text-color has-background has-normal-font-size wp-block-list"><li><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Stay out of the street! </mark></strong>The worst place to be in an urban warfare environment is to be outside.</li><li>Doors are called &#8220;the fatal funnel&#8221;. It is human nature to try and enter through a door. Aim all your weapons at the door.</li><li>Block the door from the inside with anything you can, furniture, chairs, booby-traps, but keep a percent of mobility to it. The idea is to make the invaders think the door isn&#8217;t blocked. That way, when entering, they remain exposed for the longest amount of time possible.</li><li>Stairways are another crucial zone. Block the stairways with any obstacles you can to slow down invaders. This way you also make them pay attention to their feet, while you are upstairs.</li><li>If you throw grenades downstairs, have your magazine fully topped and ready. The invaders will most likely run up the stairs to run past the grenade blast. You&#8217;ll need all the ammo you have to gun as many down as possible.</li><li>When possible, cut small holes in the floor into the rooms below to fire into. People breaching rooms will look for threats directly in front of them and usually don&#8217;t look above or below until last.</li><li>Don&#8217;t sling your weapon around your body. If things go hand-to-hand it will hinder you.</li><li>Have a knife, spade, or club close by and readily available. If you have to fight hand-to-hand it&#8217;s much more handy than a rifle.</li><li>Never fire from the same window twice.</li><li>Never stick the muzzle of your rifle outside of a window. Don&#8217;t expose it.</li><li>Shoot from deep inside the room out the window. It will help hide the muzzle flash and reduce the noise, making it hard to tell where it came from.</li><li>If you wound an enemy, don&#8217;t kill him. Let his friends come to help him. Moving a wounded soldier means it will take 4 men out of the fight to carry him away. That&#8217;s 4 less rifles firing at you.</li><li>Shoot the men trying to evacuate the wounded soldier. It will demoralize them.</li><li>Keep as many carbohydrates an you and remember to eat and hydrate. Urban warfare is incredibly intensive.</li><li>Keep moving. Never stay in one spot very long.</li><li> One very accurately placed shot can hold up a lot of people for a long time. You don&#8217;t have to be a sniper. You just have to convince them there is one in the area.</li><li>Use the sewers in subways to move whenever possible.</li><li>Whenever possible, try to let other friends know where you are located, to avoid friendly fire. It&#8217;s very easy to start shooting at each other in an urban environment.</li><li>It may be consuming, but take the tracers out of your ammunition supply and refrain from using them.</li><li>Have one magazine of all tracer rounds. Use this magazine only when you need to let everyone else know where an enemy is located at. After using it, run away immediately.</li><li>Ammunition goes fast. Conserve what you have, especially when using automatic weapons. Take into consideration the recoil and fire only 2-3 shots at a time.</li><li>10 men firing from several different buildings can appear to be a small army and stop a lot of people.</li><li>Rip down street signs, deface building names and do anything to strip the identity of where you are at. This will add confusion to an invading force.</li><li>Evacuate your wounded in a timely manner if possible.</li><li>If the enemy suddenly pulls back, GET OUT OF THE AREA IMMEDIATELY. It does not mean you are winning. It means they are going to call in heavy artillery or an air strike on your position.</li><li>If you are going to lose an area, poison common water supplies. Most likely, an enemy will try to refill their supplies at the closest source.</li><li>Cluster your booby traps in close proximity to create paranoia.</li></ol>



<h5 class="wp-block-heading">Also &#8230;</h5>



<ul class="wp-block-list"><li>in combat, you are going to experience horrible things: collapsing buildings, dead people, mutilated/burnt corpses of humans and animals, your friends disappearing a.s.o. <mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">This is the nature of war.</mark> You have to keep that in mind, as everything will happen very fast. <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-red-color">Panic is your worst enemy</mark></strong>, while the adrenaline rush is probably your best friend.</li><li>You have to keep yourself calm and collected at all times. This will help you be aware of everything that is happening around you. <strong>You cannot lose yourself.</strong></li></ul>



<div class="wp-block-cover" style="min-height:914px;aspect-ratio:unset;"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img loading="lazy" decoding="async" width="3584" height="4480" class="wp-block-cover__image-background wp-image-325" alt="" src="/wp-content/uploads/2022/02/alexander-jawfox-R_6kw7NUTLY-unsplash.jpg" data-object-fit="cover"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center" style="font-size:25px"><code>Good luck.</code></p>
</div></div>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNbreakable CTF 2021 S2 (teams) Writeups</title>
		<link>/2021/12/15/unbreakable-ctf-2021-s2-teams-writeups/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 19:10:03 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<guid isPermaLink="false">/?p=287</guid>

					<description><![CDATA[These are the writeups for the mentioned&#160;CTF&#160;contest I participated in, this time as part of a team (representing the Babeș-Bolyai<p><a href="/2021/12/15/unbreakable-ctf-2021-s2-teams-writeups/" class="more-link">Continue reading<span class="screen-reader-text">UNbreakable CTF 2021 S2 (teams) Writeups</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>These are the writeups for the mentioned&nbsp;<a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" target="_blank">CTF</a>&nbsp;contest I participated in, this time as part of a team (representing the Babeș-Bolyai University).</p>



<p><strong>Team </strong>&#8216;The Few Chosen&#8217;: <strong>Noria, D. Toma, Spurge</strong><br><strong>Won: 3rd place</strong><br>National ranks: <a href="https://unr21s2-echipe.cyberedu.ro/#ranks"></a><a href="https://unr21s2-echipe.cyberedu.ro/#ranks">https://unr21s2-echipe.cyberedu.ro/#ranks</a></p>



<iframe loading="lazy" width="1999" height="1200" src="https://drive.google.com/file/d/1yexnw4BhZzqXyl4zrHpxOIOewu9hSv-I/preview" allow="autoplay"></iframe>



<hr class="wp-block-separator is-style-wide"/>



<p>These writeups can also be found <a rel="noreferrer noopener" href="https://glacier-acrylic-3f2.notion.site/Unbreakable-2021-S2-teams-Writeups-e9816332d33a48db99b1f30f9029c559" data-type="URL" data-id="https://glacier-acrylic-3f2.notion.site/Unbreakable-2021-S2-teams-Writeups-e9816332d33a48db99b1f30f9029c559" target="_blank">here</a>.</p>



<hr class="wp-block-separator is-style-wide"/>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="724" src="/wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560-1024x724.png" alt="" class="wp-image-296" srcset="/wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560-1024x724.png 1024w, /wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560-300x212.png 300w, /wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560-768x543.png 768w, /wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560-1536x1086.png 1536w, /wp-content/uploads/2021/12/ae444f90-9c60-11eb-b4a2-87f5b1a33560.png 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UNbreakable CTF 2021 S2 (individual) Writeups</title>
		<link>/2021/12/07/unbreakable-ctf-2021-s2-individual-writeups/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Tue, 07 Dec 2021 17:37:47 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<guid isPermaLink="false">/?p=255</guid>

					<description><![CDATA[These are my writeups for the mentioned CTF contest I participated in. The national ranks can be found here: unr21s2-individual.cyberedu.ro/#ranks<p><a href="/2021/12/07/unbreakable-ctf-2021-s2-individual-writeups/" class="more-link">Continue reading<span class="screen-reader-text">UNbreakable CTF 2021 S2 (individual) Writeups</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p class="has-text-align-center">These are my writeups for the mentioned <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" data-type="URL" data-id="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" target="_blank">CTF</a> contest I participated in. The national ranks can be found here: <a rel="noreferrer noopener" href="https://unr21s2-individual.cyberedu.ro/#ranks" data-type="URL" data-id="https://unr21s2-individual.cyberedu.ro/#ranks" target="_blank">unr21s2-individual.cyberedu.ro/#ranks</a> . GG everyone.</p>



<p>Writeup link <a href="https://docs.google.com/document/d/e/2PACX-1vSokc2FONQGzGGLFC5qWCJMHjT0mKignuCtUhwBy8ZKUjS04vCsuH9DI1OJFI0nlCND0a8T-mGsIEd5/pub" data-type="URL" data-id="https://docs.google.com/document/d/e/2PACX-1vSokc2FONQGzGGLFC5qWCJMHjT0mKignuCtUhwBy8ZKUjS04vCsuH9DI1OJFI0nlCND0a8T-mGsIEd5/pub" target="_blank" rel="noreferrer noopener">here</a>.</p>



<iframe loading="lazy" width="1999" height="31500" src="https://docs.google.com/document/d/e/2PACX-1vSokc2FONQGzGGLFC5qWCJMHjT0mKignuCtUhwBy8ZKUjS04vCsuH9DI1OJFI0nlCND0a8T-mGsIEd5/pub?embedded=true">
</iframe>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How malware misbehaves &#038; how to punish it</title>
		<link>/2021/10/13/how-malware-misbehaves-how-to-punish-it/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Wed, 13 Oct 2021 10:29:52 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#malware]]></category>
		<category><![CDATA[#malwaredetection]]></category>
		<guid isPermaLink="false">/?p=160</guid>

					<description><![CDATA[In this world of ever evolving malware, its behavior and the methods used to fight against it become essential knowledge<p><a href="/2021/10/13/how-malware-misbehaves-how-to-punish-it/" class="more-link">Continue reading<span class="screen-reader-text">How malware misbehaves &#038; how to punish it</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover"><span aria-hidden="true" class="has-background-dim-60 wp-block-cover__gradient-background has-background-dim"></span><img loading="lazy" decoding="async" width="2560" height="1924" class="wp-block-cover__image-background wp-image-161" alt="" src="/wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-scaled.jpg" style="object-position:28% 20%" data-object-fit="cover" data-object-position="28% 20%" srcset="/wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-scaled.jpg 2560w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-300x226.jpg 300w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-1024x770.jpg 1024w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-768x577.jpg 768w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-1536x1155.jpg 1536w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-2048x1540.jpg 2048w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-440x330.jpg 440w, /wp-content/uploads/2021/10/michael-dziedzic-0W4XLGITrHg-unsplash-920x690.jpg 920w" sizes="(max-width: 2560px) 100vw, 2560px" /><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-red-color has-text-color has-normal-font-size"><code><strong>let's play a game of cat and mouse</strong></code></p>
</div></div>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-text-align-center">In this world of ever evolving <a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/Malware" data-type="URL" data-id="https://en.wikipedia.org/wiki/Malware" target="_blank">malware</a>, its <strong>behavior</strong> and the <strong>methods used to fight</strong> against it become <strong>essential knowledge</strong> for anyone involved in the IT industry. This article aims to shine a light on the aspects stated above, in order to help computer users stay safe and to stimulate the development of <strong>better</strong> <strong>security solutions</strong>. </p>



<p><em>Shall we ?</em> . . .</p>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">I.</mark> OS <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">processes</mark>: why are they so important?</p>



<ul class="wp-block-list"><li>when a file is executed, it becomes a process among the other already existing ones</li><li>processes have loaded modules (DLLs) and threads</li><li>each process can write into the virtual memory of another process (<span style="color:#149414" class="has-inline-color">code injection</span>)</li><li>many malicious entities use clean processes (e.g. cmd.exe, regedit.exe, explorer.exe) to execute their<span style="color:#149414" class="has-inline-color"> payloads</span> </li><li>they are directly used by the malware detection solutions</li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">II.</mark> Which are the malware <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">detection</mark> methods?</p>



<div class="wp-block-image wp-duotone-000000-ffffff-1"><figure class="alignleft size-large is-resized"><img loading="lazy" decoding="async" src="/wp-content/uploads/2021/10/proactivity-edited.png" alt="" class="wp-image-166" width="1069" height="234" srcset="/wp-content/uploads/2021/10/proactivity-edited.png 1254w, /wp-content/uploads/2021/10/proactivity-edited-300x66.png 300w, /wp-content/uploads/2021/10/proactivity-edited-1024x225.png 1024w, /wp-content/uploads/2021/10/proactivity-edited-768x168.png 768w" sizes="(max-width: 1069px) 100vw, 1069px" /></figure></div>



<div style="height:8px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<ul class="wp-block-list"><li>source detection and static detection are usually considered deprecated because they need a training set of already known malware =&gt; problems in detecting samples with novel behavior / might misclassify them</li><li>static analysis may be easily evaded through code obfuscation or by encrypting the executable file</li><li>emulation detection refers to the complete execution of the sample in a controlled environment (to monitor and record actions) =&gt; unsuitable for <span style="color:#149414" class="has-inline-color">real-time protection</span>.</li><li>some malware samples are able to detect they are executed in a controlled environment, so they alter their actions to appear harmless or manifest decoy behavior =&gt; emulation is susceptible to<span style="color:#149414" class="has-inline-color"> evasion</span></li><li>security solutions should be both <span style="color:#149414" class="has-inline-color">proactive</span> (prevent malware incidents) and <span style="color:#149414" class="has-inline-color">reactive</span> (detection for new malicious behavior can be added ASAP)</li></ul>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:280px">
<figure class="wp-block-table aligncenter"><table><tbody><tr><td class="has-text-align-center" data-align="center">=&gt; focus on <span style="color:#149414" class="has-inline-color">dynamic detection</span> &#8211; i.e.  monitor the behavior / actions of processes dynamically, at run-time</td></tr></tbody></table></figure>
</div>
</div>



<div style="height:40px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">III.</mark> Which are the <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">challenges</mark> and <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">goals</mark> of solutions based on dynamic detection?</p>



<ul class="wp-block-list"><li>a single action performed by a process is usually insufficient to distinguish between malware and legit applications</li><li>advanced malware can avoid detection by separating malicious actions into<span style="color:#149414" class="has-inline-color"> multiple processes</span> through process creation or code injection =&gt; necessity to monitor malicious groups of processes at once instead of individual ones.</li><li>system<span style="color:#149414" class="has-inline-color"> remediation</span> after detection: find which process created / handled the malicious files, check if those files were executed, if the process compromised other processes, or if any registry changes were made =&gt; in the end, everything should be reverted </li><li>definitive <strong><span style="color:#149414" class="has-inline-color">goal</span></strong>: classify processes as <strong>clean</strong> (Negative) or <strong>infected</strong> (Positive). The result can be:<ul><li><span style="color:#149414" class="has-inline-color">True Positive</span> (<span style="color:#149414" class="has-inline-color">TP</span>) &#8211; the entity was correctly classified as malicious</li><li><span style="color:#149414" class="has-inline-color">True Negative</span> (<span style="color:#149414" class="has-inline-color">TN</span>) &#8211; the entity was correctly classified as clean</li><li><span class="has-inline-color has-red-color">False Positive</span> (<span class="has-inline-color has-red-color">FP</span>) &#8211; the entity was erroneously identified as malicious (false alarm)</li><li><span class="has-inline-color has-red-color">False Negative</span> (<span class="has-inline-color has-red-color">FN</span>) &#8211; the entity was erroneously identified as clean </li></ul></li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">IV.</mark> But what do we need for <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">dynamic</mark> detection?</p>



<ul class="wp-block-list"><li><mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">heuristics</mark> &#8211; each heuristic is an algorithm (function) that analyzes the actions intercepted through monitoring; in case of any peculiar action identified, the heuristic triggers an alert which is passed to an evaluation engine</li><li><mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">interception mechanisms</mark> of the OS (for file system, processes, API etc., which entail complex components &#8211; drivers, DLLs) that provide the actions to the heuristics &#8211; we&#8217;ll focus on Windows here, as this is the most targeted OS</li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">V.</mark> Which are the <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">interception</mark> (filtering) mechanisms of the Windows OS? </p>



<ul class="wp-block-list"><li><strong><span style="color:#87ceeb" class="has-inline-color">File System Filtering</span></strong> &#8211; uses file system drivers, kernel-mode components that can monitor / modify / prevent file system operations. They are of 2 types:<ul><li>Legacy &#8211; problematic, they must handle every type of I/O operation that a file system driver performs</li><li><strong><span style="color:#87ceeb" class="has-inline-color"><a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/ifs/filter-manager-concepts" data-type="URL" data-id="https://docs.microsoft.com/en-us/windows-hardware/drivers/ifs/filter-manager-concepts" target="_blank" rel="noreferrer noopener">Minifilter drivers</a></span></strong> &#8211; more reliable, performant and with a simplified development process. They can choose which file system operations to monitor and can register pre-operation and post-operation callback routines that are called by the OS each time the monitored operations are performed.</li></ul></li><li><strong><span style="color:#87ceeb" class="has-inline-color">Process Filtering</span></strong> &#8211; a <em>minifilter</em> driver can also be used to monitor the creation and termination of processes. It can call <em>PsSetCreateProcessNotifyRoutineEx </em>API to register a callback routine. Whenever a new process is created, the registered routine is called before the initial thread of the process begins running. The routine can also terminate the process.</li><li><strong><span style="color:#87ceeb" class="has-inline-color">Registry Filtering</span></strong> &#8211; a <em>minifilter</em> driver can also be notified whenever an operation that targets the registry is performed by registering a callback routine using the <em>CmRegisterCallbackEx</em> API. It is called before and after the registry operation is completed and receives specific info about that operation as parameters. <br>By writing in registry keys like:<br><em>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run</em> , or<br><em>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run</em> , <br>the malware ensures that it will run at log-on, gaining persistence. </li><li><strong><span style="color:#87ceeb" class="has-inline-color">WIN API Hooking</span></strong> &#8211; intercept API calls by redirecting their execution to an associated routine, called <em><span style="color:#149414" class="has-inline-color">hook</span></em>, to analyze / extract info about the call (parameters or return value) =&gt; the process calls a hooked API. Methods:<ul><li><strong>Import Address Table (IAT) Hooking</strong> &#8211; the destination addresses of the functions that are statically imported by the process are altered so that they point to the hook functions</li><li><strong>In-Line Hooking</strong> &#8211; alter the instructions of the functions to be intercepted, in memory, at run-time, by changing the first several bytes (to transfer the execution to the associated hook routine). When the routine completes processing, control is transferred back to the original API (change the first several bytes back or invoke a function that contains those bytes &#8211; called Trampoline).</li><li><strong>Detours</strong> &#8211; the Detours library is provided by Microsoft to intercept functions similar to in-line hooking, by applying code dynamically at run-time. The detour function can be used to replace the hooked function or extend its functionality.</li></ul></li><li><strong><span style="color:#87ceeb" class="has-inline-color">Event Tracing for Windows (ETW)</span></strong> &#8211; allows the interception of system events generated by the Windows OS in real time. As ETW is a <strong><span style="color:#149414" class="has-inline-color">kernel</span>-level feature,</strong> it is not susceptible to some type of evasion that affects WIN API Hooking, such as <em>hook removal</em>, or <em>direct syscall usage</em>. It can also avoid application crashes caused by API hooking.<br><strong>Disadvantage</strong>: code injection and other memory manipulation actions cannot be reliably identified without the <em>Microsoft-Windows-Threat-Intelligence</em> provider, that was included in Windows 10.</li><li><strong><span style="color:#87ceeb" class="has-inline-color">Anti-Malware Scan Interface (AMSI)</span></strong> &#8211; feature included in Windows 10 that contributes to real-time malware detection. Apps can use it to invoke the security solution available on the system to analyze various objects (files, memory areas, streams, URLs, IPs, etc.). It&#8217;s especially useful in detecting malicious scripts that can be highly obfuscated / difficult to detect. The Windows 10 script hosts (<em>PowerShell / Windows Script Host / JavaScript engine</em>) integrate AMSI and invoke scans of the code, which must be and is de-obfuscated right before execution.</li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">VI.</mark> Which are the <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">common actions</mark> performed by malware?</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:66.66%">
<ul class="wp-block-list"><li>creating a<strong> copy</strong> of the original file &#8211; allows the malware to ensure persistence</li><li><strong>hiding</strong> a file &#8211; ensures the malicious file is less likely to be noticed by the user</li><li><strong>injecting code</strong> into another process &#8211; allows execution of code in the context of a process that is known to be clean (usually belonging to the OS)</li><li><strong>creating startup registry key </strong>&#8211; to ensure persistence after system restart</li><li><strong>disabling some critical OS functionalities</strong> (e.g., updates) or<strong> terminating critical processes</strong> &#8211; to keep the OS vulnerable</li></ul>



<p class="has-small-font-size"><code>E.g. 2, <span class="has-inline-color has-red-color">backdoor trojan</span>: it usually connects to a malicious command and control server, from which it waits further instructions and can execute other payloads.</code></p>
</div>



<div class="wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow" style="background-color:#1b0505;flex-basis:33.33%">
<p></p>



<p class="has-text-align-center" style="font-size:19px"><code>E.g. 1, <span class="has-inline-color has-red-color">ransomware</span> actions:</code></p>



<p class="has-text-align-center" style="font-size:19px"><code><strong><span class="has-inline-color has-red-color">1.</span></strong> drop a copy of itself on the  disk<br><strong><span class="has-inline-color has-red-color">2.</span></strong> launch a copy of itself<br><strong><span class="has-inline-color has-red-color">3.</span></strong> delete backup (shadow) files<br><strong><span class="has-inline-color has-red-color">4.</span></strong> inject code into another process <br><strong><span class="has-inline-color has-red-color">5.</span></strong> enumerate and encrypt files <br><strong><span class="has-inline-color has-red-color">6.</span></strong> display message to the user to demand ransom for the encrypted data</code></p>
</div>
</div>



<p>There are 3 actions, very common in malware, that are especially encountered in <strong>installers</strong> &amp; <strong>uninstallers</strong> ( =&gt; risk of False Positives): <span style="color:#149414" class="has-inline-color">writing executable files in the System / Windows / Temporary folders</span>, <span style="color:#149414" class="has-inline-color">executing the created files</span> and <span style="color:#149414" class="has-inline-color">registering an executable to run at start-up</span> =&gt; there&#8217;s a need to distinguish between ordinary executable files and installers/uninstallers. Legit installers are usually generated by common software installation packages, and can be identified by scanning the file for certain <strong>signatures</strong>.</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">VII.</mark> How to smartly <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">evaluate</mark> the intercepted actions?</p>



<p>A generic approach is using a <strong><span style="color:#149414" class="has-inline-color"><em>scoring engine</em></span></strong>, which contains heuristics able to detect samples that use various new combinations of malicious actions. A set of predefined features are extracted (from the executable file or based on the actions of the analyzed process). Each feature has an associated <strong><span style="color:#149414" class="has-inline-color">score</span></strong>, that is used to compute a general score for the sample. If that score exceeds a predefined <span style="color:#149414" class="has-inline-color">threshold</span>, the sample is either categorized as a certain type of malware or as clean.</p>



<p class="has-eighty-black-background-color has-background">When thinking of complex malware scoring mechanisms, one may believe that the solution can be implemented using <span style="color:#149414" class="has-inline-color">artificial intelligence</span> (<span style="color:#149414" class="has-inline-color"><strong>AI</strong></span>). An AI algorithm performs well enough in face recognition, for example, because human faces do not change their definitory characteristics over time. But <span style="color:#149414" class="has-inline-color">malware evolves at a rapid pace</span>, to use the latest features provided by operating systems and programming languages, as well as <span style="color:#149414" class="has-inline-color">to exploit the latest unpatched</span> ( <strong><span style="color:#e10600" class="has-inline-color">zero-day</span></strong> ) <span style="color:#149414" class="has-inline-color">vulnerabilities</span>. Therefore, the scoring engine must be easy to understand and maintain, precise, predictable to changes, and needs to be <span style="color:#149414" class="has-inline-color">updated very quickly</span>. This is NOT easily achieved with an AI algorithm, where the training is time consuming and the results cannot be anticipated, not to mention the constantly required <strong>re</strong>-training. Also, adding a new heuristic may damage the entire scoring mechanism. Furthermore, an <span style="color:#149414" class="has-inline-color">appropriate training set for dynamic malware detection is almost impossible to find</span>.</p>



<p>In <span style="color:#149414" class="has-inline-color">practice</span>, adapting the scoring engine to a new threat should require writing a couple of heuristics and calibrating the scores and weights only for them. More exactly, when another malware technique appears in the wild, a security researcher needs to test the security solution against samples or <span style="color:#149414" class="has-inline-color">proof of concepts</span> (POCs) that exhibit the new behavior. He / She may also <span style="color:#149414" class="has-inline-color">manually</span> capture the behavior of the processes by simply using a tool like <strong><em><span style="color:#149414" class="has-inline-color"><a rel="noreferrer noopener" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon" data-type="URL" data-id="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon" target="_blank">Process Monitor</a></span></em></strong>. If the current detection model does not identify the new malicious technique, it&#8217;s a clear sign that the current model must be extended.</p>



<p>In a broader perspective, such a solution should be integrated in a modern security application, together with other components such as URL blocking, firewall, classic AV signatures, etc.</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">VIII.</mark> Now, which are the <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">smart tricks</mark> used to stay under the radar?</p>



<ul class="wp-block-list"><li>solutions that use <span style="color:#149414" class="has-inline-color">dependency graphs</span> constructed from API / system calls, may be evaded by replacing a call sequence with its semantic equivalent and/or inserting redundant calls</li><li>instead of executing all the malicious actions in a single process, <strong><span style="color:#149414" class="has-inline-color">distribute</span></strong> the payload to multiple, distinct processes, to be executed over a long period of time. <span class="has-inline-color has-white-color"> </span>Because behavior-based detection cannot identify a process based on a single action (due to the risk of False Positives), multiple individual processes, each performing a smaller set of actions, may go <span style="color:#149414" class="has-inline-color">unnoticed</span>.<br><span style="color:#149414" class="has-inline-color">Injecting</span> the payload in multiple processes also makes cleanup difficult:  if only one affected process is terminated, the malware is capable of re-instantiating itself from another injected process. <br>The distinct malicious processes (that make up an attack) may <span style="color:#149414" class="has-inline-color">communicate</span> using traditional inter-process communication, supported by the OS, or through purposely implemented mechanisms.</li></ul>



<ul class="wp-block-list"><li><strong>Windows</strong> <strong>OS</strong> <span style="color:#149414" class="has-inline-color">problems that make exploitation easier</span>: <ul><li>it does not keep a strict relation between child processes and parent processes =&gt; managing related processes for detection is more difficult, requiring OS specific knowledge</li><li>it allows code to be injected in a trivial way and does not provide a synchronous notification when injections occur =&gt; detecting all code injection methods is also considerably hard</li></ul></li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">IX.</mark> How do we <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">combat</mark> <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">multi-process</mark> malware, though?</p>



<ul class="wp-block-list"><li>represent the actions performed by each process as feature vectors, then correlate them with the actions performed by the child processes. Disadvantages: difficult to implement, does not consider code injection when correlating processes.</li><li>divide the processes into categories: <em>group creators</em> (they create other processes, not necessarily related to them), <em>group inheritors</em> and <em>unmonitored processes</em>. By <span style="color:#149414" class="has-inline-color">assigning a category / role to each process</span>, the groups of processes are much easier to identify and manage. The category of a process can be identified based on features like: the file path, the digital signature or a hash computed for the executable file. </li><li>as installers can be used as a <span style="color:#149414" class="has-inline-color">spreading mechanism</span>, when an installation starts, the solution should create a<strong><em><span style="color:#149414" class="has-inline-color"> process lineage tree</span></em></strong>, in which the root is the initial installer application. When the root or a descendant creates a new process, it should be added to the lineage tree as a child of the process that created it. This way, we can observe better the deepness and the exact activity of that installation, as it happens.</li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">X.</mark> How about the <mark style="background-color:rgba(0, 0, 0, 0);color:#149414" class="has-inline-color">advanced cyberattacks &amp; cyberweapons </mark><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-medium-gray-color">detection</mark>?&#8230; <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>Well, as more and more people are being affected by this <span style="color:#149414" class="has-inline-color"><strong><a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/National_Security_Agency" data-type="URL" data-id="https://en.wikipedia.org/wiki/National_Security_Agency" target="_blank">NSA</a></strong>-level madness</span> <strong><span class="has-inline-color has-white-color">(</span></strong> shouldn&#8217;t come as a surprise, since some of their <em>most</em> <em>sophisticated</em> tools &amp; exploits were leaked online by <em><strong><a rel="noreferrer noopener" href="https://en.wikipedia.org/wiki/The_Shadow_Brokers" data-type="URL" data-id="https://en.wikipedia.org/wiki/The_Shadow_Brokers" target="_blank">The Shadow Brokers </a></strong></em>&#8211; but that&#8217;s a story for another time <strong><span class="has-inline-color has-white-color">)</span></strong>, we have to talk about this too.</p>



<p>These attacks are usually orchestrated by <span style="color:#149414" class="has-inline-color">Advanced Persistent Threat (</span><span style="color:#e10600" class="has-inline-color">APT</span><span style="color:#149414" class="has-inline-color">) actors</span> &#8211; highly skilled, motivated and well-funded <em>hackers</em>, with ample resources at their disposal (usually nation state sponsored, as now it is much cheaper and effective to <span class="has-inline-color has-red-color">attack</span> and <span class="has-inline-color has-red-color">spy</span> your enemies in the cyberspace).</p>



<figure class="wp-block-image alignwide size-full"><img loading="lazy" decoding="async" width="1000" height="725" src="/wp-content/uploads/2021/10/activity-actor-ramp-diagram.png" alt="" class="wp-image-220" srcset="/wp-content/uploads/2021/10/activity-actor-ramp-diagram.png 1000w, /wp-content/uploads/2021/10/activity-actor-ramp-diagram-300x218.png 300w, /wp-content/uploads/2021/10/activity-actor-ramp-diagram-768x557.png 768w" sizes="(max-width: 1000px) 100vw, 1000px" /><figcaption>APT actors &amp; their motives / targets<br><a rel="noreferrer noopener" href="https://www.secureworks.com/blog/advanced-persistent-threats-apt-a" data-type="URL" data-id="https://www.secureworks.com/blog/advanced-persistent-threats-apt-a" target="_blank">https://www.secureworks.com/blog/advanced-persistent-threats-apt-a</a></figcaption></figure>



<ul class="wp-block-list"><li>APT attacks are carefully planned and often designed for a specific victim after a significant amount of time is spent researching the target =&gt; challenging to detect</li><li>some security researchers <strong>try</strong> to combat this by combining the capabilities of the behavioral security solution with the <strong><span style="color:#149414" class="has-inline-color"><a rel="noreferrer noopener" href="https://attack.mitre.org/" data-type="URL" data-id="https://attack.mitre.org/" target="_blank">MITRE ATT&amp;CK</a></span></strong> knowledge base of <span style="color:#149414" class="has-inline-color">adversary tactics</span> <span style="color:#149414" class="has-inline-color">and techniques</span>,  which are classified in 14 categories:</li></ul>



<ol class="has-eighty-black-background-color has-background has-normal-font-size wp-block-list"><li><kbd><em><span style="color:#149414" class="has-inline-color">Reconnaissance</span></em> - gather critical information to plan future operations</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Resource Development</span></em> - create/purchase/compromise/steal resources that can be used to support operations</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Initial Access</span></em> - get into the target network</kbd> </li><li><kbd><em><span style="color:#149414" class="has-inline-color">Execution</span> - </em>run malicious code</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Persistence</span></em> - maintain your access</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Privilege Escalation</span></em> - get higher-level permissions</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Defense Evasion</span></em> - avoid being detected</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Credential Access</span></em> - steal account names and passwords</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Discovery</span></em> - figure out &amp; map the environment you're in</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Lateral Movement</span></em> - move through the environment</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Collection</span></em> - gather data of interest to your goal</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Command and Control</span></em> - communicate with &amp; control compromised systems</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Exfiltration</span></em> - steal sensitive data</kbd></li><li><kbd><em><span style="color:#149414" class="has-inline-color">Impact</span></em> - manipulate and/or destroy the systems and data</kbd></li></ol>



<ul class="wp-block-list"><li>these tactics also represent <span style="color:#149414" class="has-inline-color">reasons</span> for malware to perform certain actions. Moreover, each category is broken-down into multiple techniques and sub-techniques that indicate how a tactical goal is achieved.</li></ul>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-large-font-size"><mark style="background-color:rgba(0, 0, 0, 0);color:#901a1a" class="has-inline-color">Conclusion</mark></p>



<p>To wrap up, there are two serious <span style="color:#149414" class="has-inline-color">problems</span> that always seem to <strong><span style="color:#149414" class="has-inline-color">haunt</span></strong> the defense professionals: the <strong><span style="color:#149414" class="has-inline-color">time gap</span></strong> between the moment a new malware is released, until a behavioral model is available for that malware type (as systems are exposed to attacks), and the<strong> <span style="color:#149414" class="has-inline-color">sophisticated cyberattacks</span></strong> (<span class="has-inline-color has-red-color">APT</span>&#8216;s specialty), which are particularly difficult to detect and they are often discovered when it&#8217;s already <span style="color:#149414" class="has-inline-color">too late</span>. Thus, there&#8217;s still an acute need for proactive behavioral detection solutions with fast response capabilities.</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-text-align-center has-extra-small-font-size">Publications used for this article:<br><em>Sushil Kumar et al. An emerging threat fileless malware: a survey and research challenges, 2020<br>Steve Mansfield-Devine. The malware arms race. Computer Fraud &amp; Security, 2018<br>Jaime Devesa, Igor Santos, Xabier Cantero, Yoseba K. Penya, and Pablo Garcia Bringas. Automatic behaviour-based analysis and classification system for malware detection, 2010<br>Romanch Agarwal, Prabhat Kumar Singh, Nitin Jyoti, Harinath Ramachetty Vishwanath, and Palasamudram Ramagopal Prashanth. System and method for non-signature based detection of malicious processes, 2016<br>Ishai Rosenberg and Ehud Gudes. Bypassing system calls based intrusion detection systems, 2017<br>Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, and Jyh-Charn Liu. Shadow attacks: automatically evading system-call-behavior based malware detection, 2012<br>Jithin Pavithran, Milan Patnaik, and Chester Rebeiro. D-time: distributed threadless independent malware execution for runtime obfuscation, 2019<br>Gheorghe Hajmasan, Alexandra Mondoc, and Octavian Cret. Dynamic behavior evaluation for malware detection. In 2017 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, 2017<br>Gheorghe Hajmasan, Alexandra Mondoc, Radu Portase, and Octavian Cret. Evasive Malware Detection Using Groups of Processes, 2017<br>Gheorghe Hajmasan, Radu Portase. Systems and methods for tracking malicious behavior across multiple software entities, 2020<br>Sandor Lukacs, Raul Tosa, Paul Boca, Gheorghe Hajmasan, Andrei Lutas. Complex scoring for malware detection, 2016<br>Sandor Lukacs, Raul Tosa, Paul Boca, Gheorghe Hajmasan, Andrei Lutas. Process evaluation for malware detection in virtual machines, 2015<br>Bill Blunden. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2009</em><br><br></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SQL Injections showcase</title>
		<link>/2021/10/06/sql-injections-showcase/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Wed, 06 Oct 2021 20:43:49 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#badstore]]></category>
		<category><![CDATA[#cybersecurity]]></category>
		<category><![CDATA[#hack]]></category>
		<category><![CDATA[#loginbypass]]></category>
		<category><![CDATA[#SQLinjection]]></category>
		<category><![CDATA[#webvulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">/?p=137</guid>

					<description><![CDATA[This is my winning solution for a faculty SQL Injection contest I participated in 2021. The main challenge was to<p><a href="/2021/10/06/sql-injections-showcase/" class="more-link">Continue reading<span class="screen-reader-text">SQL Injections showcase</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>This is my winning solution for a faculty <span style="color:#149414" class="has-inline-color"><em>SQL Injection</em> contest</span> I participated in 2021.</p>



<p>The main challenge was to find <em>inventive and playful</em> ways to <span style="color:#149414" class="has-inline-color">exploit</span> database connected applications that are <span style="color:#149414" class="has-inline-color">vulnerable</span> to this kind of attack. </p>



<p>Therefore, I used two applications: <a rel="noreferrer noopener" href="https://github.com/StefanCsPurge/Web-Programming/tree/main/9%20SHCarsWebsite_-_Angular_ASP_NET_API" data-type="URL" data-id="https://github.com/StefanCsPurge/Web-Programming/tree/main/9%20SHCarsWebsite_-_Angular_ASP_NET_API" target="_blank">one that was entirely coded by me</a>, and the other being a vulnerable webservice hosted on a Linux server. It was fun <span style="color:#149414" class="has-inline-color">( ͡° ͜ʖ ͡°)</span> .</p>



<p>Below is the complete description of the exploitation process / write-up.</p>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-791x1024.jpg" alt="" class="wp-image-151" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-791x1024.jpg" alt="" class="wp-image-152" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-791x1024.jpg" alt="" class="wp-image-153" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="1024" height="678" src="/wp-content/uploads/2021/10/ALL_DB_schema-1024x678.png" alt="" class="wp-image-147" srcset="/wp-content/uploads/2021/10/ALL_DB_schema-1024x678.png 1024w, /wp-content/uploads/2021/10/ALL_DB_schema-300x199.png 300w, /wp-content/uploads/2021/10/ALL_DB_schema-768x508.png 768w, /wp-content/uploads/2021/10/ALL_DB_schema.png 1511w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>DB schema</figcaption></figure>



<p>The Github repo for this solution can be found <a href="https://github.com/StefanCsPurge/Databases/tree/main/SQL%20Injections%20showcase" data-type="URL" data-id="https://github.com/StefanCsPurge/Databases/tree/main/SQL%20Injections%20showcase" target="_blank" rel="noreferrer noopener">here</a>.</p>



<p>The above PDF and video demo can be found <a href="https://drive.google.com/drive/folders/1svT-g4Nj4H5FY8-KSorNLEh5p0738txr" data-type="URL" data-id="https://drive.google.com/drive/folders/1svT-g4Nj4H5FY8-KSorNLEh5p0738txr" target="_blank" rel="noreferrer noopener">here</a>. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Recent history the world deserves to know</title>
		<link>/2021/10/03/hello-world/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Sun, 03 Oct 2021 16:27:40 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<guid isPermaLink="false">/?p=1</guid>

					<description><![CDATA[The book &#8220;This Is How They Tell Me the World Ends&#8221; by Nicole Perlroth contains valuable information about all the<p><a href="/2021/10/03/hello-world/" class="more-link">Continue reading<span class="screen-reader-text">Recent history the world deserves to know</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>The book &#8220;<em><strong>This Is How They Tell Me the World Ends</strong></em>&#8221; by <strong>Nicole Perlroth</strong> contains valuable information about all the important events in the world of cyber warfare internationally.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="674" height="1024" src="/wp-content/uploads/2021/10/91YHYvJdgxL-674x1024.jpg" alt="" class="wp-image-80" srcset="/wp-content/uploads/2021/10/91YHYvJdgxL-674x1024.jpg 674w, /wp-content/uploads/2021/10/91YHYvJdgxL-197x300.jpg 197w, /wp-content/uploads/2021/10/91YHYvJdgxL-768x1168.jpg 768w, /wp-content/uploads/2021/10/91YHYvJdgxL-1010x1536.jpg 1010w, /wp-content/uploads/2021/10/91YHYvJdgxL-1347x2048.jpg 1347w, /wp-content/uploads/2021/10/91YHYvJdgxL.jpg 1684w" sizes="(max-width: 674px) 100vw, 674px" /><figcaption>https://www.amazon.com/This-They-Tell-World-Ends/dp/1635576059</figcaption></figure>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
