{"id":354,"date":"2022-03-20T18:40:20","date_gmt":"2022-03-20T18:40:20","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=354"},"modified":"2022-03-20T18:40:20","modified_gmt":"2022-03-20T18:40:20","slug":"social-engineering-playing-with-human-vulnerabilities","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2022\/03\/20\/social-engineering-playing-with-human-vulnerabilities\/","title":{"rendered":"Social Engineering. Playing with human vulnerabilities :)"},"content":{"rendered":"\n
<\/p>\n\n\n\n
<\/p>\n\n\n\n
If you think you can\u2019t be tricked, you\u2019re just the person I\u2019d like to meet.<\/strong><\/em><\/p>\n\n\n\n R. Paul Wilson<\/p>\n\n\n\n <\/p>\n<\/div><\/div>\n\n\n\n Well, given the plethora of news about scammers and people being easily fooled by them, the public opinion about this subject is anything but positive. However,make no mistake<\/mark>, it surely isn’t just that… Given the information above, you’ve probably realized that there’s a high probability to be a target of such trickery. With enough time and enough effort anyone can be social engineered. Those words are true, as scary as they are. That doesn\u2019t mean there is no hope; it means your job is to make malicious social engineering so difficult and time consuming that most hackers will give up.<\/mark><\/em> <\/kbd> As usual, this information is for education purposes only. A lot of social engineers face prison<\/mark><\/strong> time as well. So, have fun, but respect the legal and ethical constraints. Otherwise, make sure that you’re hiding better than everyone else can hide, in the 21st <\/sup>century.<\/p>\n\n\n\n The most important phase of the attack. Usually takes from days to months, depending on the target. For example, this is what the Russian government<\/mark> had been doing for at least 8 years in Ukraine, using cyberattacks<\/mark> and spies<\/mark>, before starting an invasion on 24th<\/sup> of February 2022.<\/p>\n\n\n\n Mindset<\/strong>: no piece of information is irrelevant; even the slightest detail can lead to a successful breach.<\/p>\n\n\n\n Example<\/strong>: Mati Aharoni<\/strong> (professional pentester) was tasked with gaining access to a company that had an almost nonexistent Web footprint. After some internet searching, he found a high-ranking company official who used his corporate email on a forum about stamp collecting and who expressed an interest in stamps from the 1950s. Mati created a website like The problem<\/mark><\/strong>: using social media, people can easily share every aspect of their lives with anyone they choose, making potentially damaging information (for their personal & business security) more readily available than ever before. <\/p>\n\n\n\n Example<\/strong>: Max Fosh infiltrated into The International Security<\/em><\/strong> Convention<\/em><\/strong> (the irony). He used a badge found on an Instagram<\/strong> post from the event (edited a little bit in Photoshop, then printed) -> video: https:\/\/youtu.be\/qM3imMiERdU<\/a>. <\/p>\n\n\n\n Also, many employees talk about their job title in their social media outlets. This can help a social engineer to profile how many people may be in a department and how the departments are structured. In training materials, the National Security Agency<\/a><\/strong> of the United States government defines elicitation as \u201cthe subtle extraction of information during an apparently normal and innocent conversation<\/strong>.\u201d Generally speaking, being able to use elicitation means you can fashion questions that draw people out and stimulate them to take a path<\/mark> of a behavior you want<\/strong>. Preloading<\/em> can be a critical part of elicitation, and denotes just what it says\u2014preload targets with ideas on how you want them to react to certain information. It is often used in marketing messages (e.g. movie trailers soundtrack). <\/p>\n\n\n\n A simplistic example<\/strong>: a friend walks up and says, \u201cI have to tell you a really funny story.\u201d What happens to you? You might even start smiling before the story starts and your anticipation is to hear something funny, so you look and wait for opportunities to laugh. He preloaded you and you anticipated the humor. Another one: interrogators would say \u201cNow think carefully before you answer the next question\u2026\u201d. This kind of statement preloads the target\u2019s mind with the idea that he must be truthful with his next statement.<\/p>\n\n\n\n Basically, it’s all about being able to plant ideas or thoughts in a way that is not obvious or overbearing<\/mark>, as a first step<\/mark>, before starting the actual attack<\/mark>. Because you ‘preloaded’ the target, when the time arises to present an absurd idea, it will most probably be accepted.<\/p>\n\n\n\n Pretexting is defined as the background story, dress, grooming, personality, and attitude<\/strong> that make up the character you will be for the social engineering audit (you create a new identity). Chris Nickerson<\/strong>: it is not about living a lie (…). You are, in every fiber of your being, the person you are portraying. The way he walks, the way he talks, body language\u2014you become that person.<\/em> <\/p>\n\n\n\n What is a good pretext based on? First of all, the quality of the information<\/strong> gathered beforehand. Then, the practice of dialects\/expressions<\/strong>, the simplicity<\/strong> (the simpler the pretext the better the chance of success), confidence<\/strong> (helps a lot in convincing the target you are who you say you are; usually achieved by involving personal interests in the pretext), and the finale: providing a logical conclusion<\/strong> or follow through for the target. <\/p>\n\n\n\n Example<\/strong>: a popular malicious<\/mark> pretext right now is the fake ‘fund raiser’, who takes advantage of the current Ukrainian crisis. These individuals behave like they care, presenting the atrocities of war (simple<\/em> pretext<\/em> that triggers people’s emotions), and demand money for helping Ukrainians (the logical conclusion<\/em>). The same happened right after 9\/11<\/em> , 2001.<\/p>\n\n\n\n A social engineer has to understand the modes of thinking. Why? Well, if you can first figure out the target’s dominant mode of thinking (and then use it yourself in subtle ways), you can unlock the doors of the target’s mind and help him actually feel at ease when telling you even intimate details. So, how can you figure out someone’s dominant mode of thinking?<\/p>\n\n\n\n The world is brought to our brain by our senses<\/strong>: sight, hearing, touch, smell, taste (traditional classification). The modes of thinking are associated with only 3 of them. Therefore, we have the:<\/p>\n\n\n\n Asking questions that contain some of the key dominant words, observing a target\u2019s reactions, and listening can reveal what dominant sense he or she uses. <\/p>\n\n\n\n Let’s take the example<\/strong> of an excellent salesguy, Tony<\/mark><\/strong><\/em>, who can figure out someone’s dominant sense in 60 seconds. When he first engages the target, he has a very shiny silver-and-gold pen in his hand. He gestures a lot and notices whether the person follows the pen with her eyes; if she does slightly, Tony will continually make the gestures bigger to see whether her eyes follow. If that doesn\u2019t seem to work in the first few seconds, he will click the pen open and closed. It isn\u2019t a loud noise, but loud enough to disrupt a thought and draw someone’s attention if she’d be an auditory. If he thinks that is working, he will click it with every important thought, causing the target to have a psychological reaction to the sound and what is being said. If that doesn’t seem to work, he will reach over the table and tap her wrist or forearm, or if he is close enough, touch her shoulder. He doesn’t touch excessively, but enough to see whether she will shy away or seems overly happy or disturbed by the touch. At this point, he’s most likely guessed the correct sense and starts to move the conversation in that direction, to make the target more comfortable. Microexpressions are facial expressions which are not easily controllable and occur in reaction to emotions. Many times they last for as short as one-twenty-fifth of a second. Because these expressions are involuntary muscular movements due to an emotional response, they are nearly impossible to control. <\/strong>Social engineers use them to notice deception and figure out how the target is really feeling, in order to act accordingly. Another crucial reason is stated by Dr. Paul Ekman<\/a>: If producing the facial expression can cause the emotion, that must mean that our facial movements can affect the emotions we feel, and maybe even the emotions of those around us.<\/strong><\/em> Basically, social engineers practice<\/strong> producing the facial expressions voluntarily, as it makes it easier to achieve a certain emotional state.<\/p>\n\n\n\n Let’s take a look at the microexpressions<\/em> linked with some basic or biologically universal emotions:<\/p>\n\n\n\n Showing genuine<\/mark> emotions<\/strong> is known to be a difficult task. One of the tricks actors use to be able to successfully show proper emotion is to remember and focus on a time when they truly felt the emotion they need to portray. Learning to correctly exhibit<\/strong> the subtle hints of<\/strong> microexpressions<\/strong> can cause the neurons in your target\u2019s brain to mirror the emotional state they feel you are displaying, making your target more willing to comply with your request.<\/p>\n\n\n\n On the other hand, using this knowledge, there are 4 things that can help you detect lies \/ deceit<\/mark><\/strong> in a target:<\/p>\n\n\n\n Why<\/strong> exactly do social engineers want to detect deceit? If their pretext is someone with authority (manager or department supervisor), and they catch someone lying, they can use that in their advantage<\/strong>. By “forgiving” the person, they are now owed a favor in return.<\/mark><\/p>\n\n\n\n NLP was developed in the 1970s by Richard Bandler and John Grinder with the guidance of Gregory Bateson. Without any regulating body, the field grew as everybody wanted to learn to control others, lie without getting caught, or solve all their psychological problems.<\/p>\n\n\n\n The new\/modern approach<\/strong> of NLP states that to make a change, the unconscious<\/mark><\/strong> mind of the target must be involved, the new behavior must satisfy their original positive intention, and the change must occur internally, at the state of mind<\/strong>, rather than at the behavioral level. This new code suggests how NLP can create serious and drastic changes to a person’s thinking.
\n\n\n\nWhat<\/mark> is social engineering ? <\/h3>\n\n\n\n
Actually, social engineering<\/strong><\/em> is the art, or better yet, science of skillfully maneuvering a person to take an action that may<\/strong><\/em> or may not<\/strong><\/em> be in the “target’s” best interest<\/mark>. Thus, besides crimes, you can also notice it in: business marketing, the way children get their parents to give in to their demands, the way doctors, lawyers, or psychologists obtain information from their clients. Obviously, you can also find it in law enforcement, and in dating \u2014 it is truly used in every human interaction, from babies to politicians …<\/p>\n\n\n\nTypes<\/mark> of social engineers<\/h3>\n\n\n\n
\n\n\n\n
How do I stay safe?<\/em> Great question.
Well, what I can say for sure, is that you are safer<\/em> if you know and understand the techniques used for a successful social engineering attack<\/strong>. This is why, in the next section, I’m going to explain decisive skills<\/strong> like: information gathering<\/mark>, elicitation<\/mark>, pretexting<\/mark>, microexpressions<\/mark>, Neurolinguistic Programming<\/mark>, interview & interrogation<\/mark>, building rapport<\/mark>, The Human Buffer Overflow<\/mark>, influence tactics<\/mark> (reciprocation, obligation, concession, scarcity, authority, commitment, liking, social proof), framing<\/mark>, and, the last but not least, manipulation<\/mark>.<\/p>\n\n\n\n
(Christopher Hadnagy)<\/kbd><\/p>\n\n\n\n
\n\n\n\n\ud83d\udd75\ufe0f\u200d\u2640\ufe0f<\/mark>Information<\/mark> gathering<\/h3>\n\n\n\n
stampcollections.com<\/code>, where he put 1950s stamp photos found on Google, and embedded a malicious frame that exploited a vulnerability in the popular web browser at the time. So, accessing the link<\/strong> would give the attacker control over the victim’s computer. Then, he crafted an email for this company official. In the email, it’s stated that he’s another user of the same forum, who noticed the interest in old stamps, and that his grandfather, who ‘passed away’, left a stamp collection that can be seen on Mati’s stampcollections.com<\/kbd> website. Before sending the email, for maximum impact, he called the target on the phone. This way, Mati built trust by discussing on a friendly tone about his stamp offer, while also expressing some feelings of sadness for the recent death in his family (triggering compassion). Thus, the target was very eager to see this collection. As soon as the man received the email, he clicked the link and the company\u2019s perimeter was compromised. The tiny piece of information<\/strong><\/em> that led to this successful attack: a corporate email on a random website.<\/p>\n\n\n\n
Other sources<\/strong> & techniques<\/strong>: Apple\/Google Maps (for an idea about the target’s buildings, ways in & out), Google Dorks<\/a>, WhoIs<\/a>, NMAP, Maltego<\/a>, forums, overhearing conversations, flirting with the target, public reports, or simply the trash (you’d be surprised how much sensible information is literally dumped).
Attackers look for the links between the information extracted from all sources, to create a whole profile.<\/strong> This profile includes contact numbers, biographies, email naming conventions, special words or phrases that can help in password profiling, family members, physical locations, purchases, leases, contracts, favorite foods\/teams\/music, the service companies used, etc. Everything is processed in order to find vulnerabilities and come up with the best attack strategy.<\/p>\n\n\n\n\ud83d\udcacElicitation<\/mark><\/h3>\n\n\n\n
This method works so well because the conversation can occur anywhere the target feels comfortable (their routine places, for example). Other reasons are that:
– most people have the desire to be polite, especially to strangers
– professionals want to appear well informed and intelligent
– if you are praised, you will often talk more and divulge more
– most people would not lie for the sake of lying
– most people respond kindly to people who appear concerned about them.
Goal<\/strong>: obtain information then utilize that information to motivate a target to the path you want him to take (only through casual conversation). Therefore the attacker must be ‘natural<\/strong>‘, well informed<\/strong> about the subject he’s talking about, and not greedy<\/strong> with the questions, to avoid raising any red flag.<\/p>\n\n\n\nPreloading<\/h4>\n\n\n\n
A successful elicitor:<\/h5>\n\n\n\n
\ud83c\udfadPretexting<\/mark>: How to Become Anyone<\/h3>\n\n\n\n
\ud83e\udde0Modes<\/mark> of thinking & the senses<\/h3>\n\n\n\n
This is the type of people that must touch everything in the grocery store when they shop, whether they need it or not. By touching the objects, they make a connection. This is what helps them clearly remember the things later. <\/li><\/ul>\n\n\n\n
Why<\/strong> exactly does Tony do all of this stuff? Think about it: if someone makes you feel “warm and fuzzy”, or seems to understand what you are saying, or where you are coming from, you easily open up to, trust, and let that person in your circle<\/strong>. <\/p>\n\n\n\n\ud83e\udd72Microexpressions<\/mark><\/h3>\n\n\n\n
\ud83d\udde3\ufe0fNeurolinguistic<\/mark> Programming (NLP)<\/h3>\n\n\n\n