Chapter 4

Social Engineering Attacks

This chapter covers the following topics related to Objective 3.6 (Given a scenario, perform a social engineering or physical attack.) of the CompTIA PenTest+ PT0-002 certification exam:

  • Pretext for an approach

  • Social engineering attacks

    • Email phishing

      • Whaling

      • Spear phishing

    • Vishing

    • Short message service (SMS) phishing

    • Universal Serial Bus (USB) drop key

    • Watering hole attack

  • Physical attacks

    • Tailgating

    • Dumpster diving

    • Shoulder surfing

    • Badge cloning

  • Impersonation

  • Tools

    • Browser exploitation framework (BeEF)

    • Social engineering toolkit

    • Call spoofing tools

  • Methods of influence

    • Authority

    • Scarcity

    • Social proof

    • Urgency

    • Likeness

    • Fear

Cyber attacks and exploits are occurring more and more frequently all the time. You have to understand threat actors’ tactics in order to mimic them and become a better penetration tester. This chapter covers the most common types of attacks and exploits. It starts by describing attacks against the weakest link, which is the human element. These attacks are called social engineering attacks. Social engineering has been the initial attack vector of many breaches and compromises in the past several years. In this chapter, you will learn about various social engineering attacks, such as phishing, vishing, pharming, spear phishing, whaling, and others. You will also learn about social engineering techniques such as elicitation, interrogation, and impersonation, as well as different motivation techniques (or methods of influence). You will also learn what shoulder surfing is and how attackers have used the “USB key drop” trick to fool users into installing malware and compromising their systems.

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz allows you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 4-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Q&A Sections.”

Table 4-1 “Do I Know This Already?” Section-to-Question Mapping

Foundation Topics Section

Questions

Pretexting for an Approach and Impersonation

1

Social Engineering Attacks

2, 3

Physical Attacks

4, 5

Social Engineering Tools

6–8

Methods of Influence

9, 10

Caution

The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as incorrect for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.

1. Which of the following is the term used when an attacker presents himself or herself as someone else in order to gain access to information or manipulate a user?

  1. Social engineer interrogation

  2. Phishing

  3. Elicitation

  4. Pretexting

2. Which of the following is a targeted email attack?

  1. Pharming

  2. Spear phishing

  3. Shoulder surfing

  4. None of these answers are correct.

3. Which of the following is a social engineering attack that is similar to phishing and spear phishing but that targets high-profile executives and key individuals in an organization?

  1. Malvertising

  2. Pharming

  3. Vishing

  4. Whaling

4. Which of the following refers to a person scavenging for private information in garbage and recycling containers?

  1. Vishing

  2. Dumpster diving

  3. Dumpster phishing

  4. All of these answers are correct.

5. Which of the following is not true about badge-cloning attacks?

  1. Attackers can often leverage pictures of people’s badges in social media.

  2. Specialized software and hardware can be used to perform these cloning attacks.

  3. Attackers can clone a badge to access a building.

  4. Attackers cannot perform badge cloning using software. Hardware tokens must be used.

6. Which of the following is a social engineering tool that you can use after you exploit a cross-site scripting vulnerability and manipulate the victim’s system?

  1. BeEF

  2. SET

  3. Nikto

  4. Nessus

7. Which of the following is a social engineering tool that can be used to send a spear phishing email?

  1. BeEF

  2. SpoofApp

  3. SpoofCard

  4. SET

8. Which of the following is an Apple iOS and Android app that can spoof a phone number and change your voice, record calls, generate different background noises, and send calls straight to voicemail?

  1. SpoofCard

  2. Meterpreter

  3. SET

  4. Vishing+

9. Which of the following is a psychological phenomenon in which an individual is not able to determine the appropriate mode of behavior?

  1. Social proof

  2. Scarcity

  3. Vishing

  4. None of these answers are correct.

10. Which of the following are methods of influence often used by social engineers? (Choose all that apply.)

  1. Authority

  2. Scarcity

  3. Urgency

  4. All of these answers are correct.

Foundation Topics

Pretexting for an Approach and Impersonation

Influence, interrogation, and impersonation are key components of social engineering. Elicitation is the act of gaining knowledge or information from people. In most cases, an attacker gets information from a victim without directly asking for that particular information.

How an attacker interrogates and interacts with a victim is crucial for the success of a social engineering campaign. An interrogator can ask good open-ended questions to learn about an individual’s viewpoints, values, and goals. The interrogator can then use any information the target revealed to continue to gather additional information or to obtain information from another victim.

It is also possible for an interrogator to use closed-ended questions to get more control of the conversation and to lead the conversation or to actually stop the conversation. Asking too many questions can cause the victim to shut down the interaction, and asking too few questions may seem awkward. Successful social engineering interrogators use a narrowing approach in their questioning to gain as much information as possible from the victim.

Interrogators pay close attention to the following:

  • The victim’s posture or body language

  • The color of the victim’s skin, such as the face color becoming pale or red

  • The direction of the victim’s head and eyes

  • Movement of the victim’s hands and feet

  • The victim’s mouth and lip expressions

  • The pitch and rate of the victim’s voice, as well as changes in the voice

  • The victim’s words, including their length, the number of syllables, dysfunctions, and pauses

With pretexting, or impersonation, an attacker presents as someone else in order to gain access to information. In some cases, it can be very simple, such as quickly pretending to be someone else within an organization; in other cases, it can involve creating a whole new identity and then using that identity to manipulate the receipt of information. Social engineers may use pretexting to impersonate individuals in certain jobs and roles even if they do not have experience in those jobs or roles.

Decorative

For example, a social engineer may impersonate a delivery person from Amazon, UPS, or FedEx or even a bicycle messenger or courier with an important message for someone in the organization. As another example, someone might impersonate an IT support worker and provide unsolicited help to a user. Impersonating IT staff can be very effective because if you ask someone if he or she has a technical problem, it is quite likely that the victim will think about it and say something like, “Yes, as a matter of fact , yesterday this weird thing happened to my computer.” Impersonating IT staff can give an attacker physical access to systems in an organization. An attacker who has physical access can use a USB stick containing custom scripts to compromise a computer in seconds.

Pharming is a type of impersonation attack in which a threat actor redirects a victim from a valid website or resource to a malicious one that could be made to appear as the valid site to the user. From there, an attempt is made to extract confidential information from the user or to install malware in the victim’s system. Pharming can be done by altering the host file on a victim’s system, through DNS poisoning, or by exploiting a vulnerability in a DNS server. Figure 4-1 illustrates how pharming works.

An illustration shows the Pharming example.

FIGURE 4-1 Pharming Example

The following steps are illustrated in Figure 4-1:

Step 1. The user (Omar) visits a legitimate website and clicks on a legitimate link.

Step 2. Omar’s system is compromised, the host file is modified, and Omar is redirected to a malicious site that appears to be legitimate. (This could also be accomplished by compromising a DNS server or spoofing a DNS reply.)

Step 3. Malware is downloaded and installed on Omar’s system.

Tip

To help prevent pharming attacks, it is important to keep software up to date and run regular anti-malware checks. You should also change the default passwords in network infrastructure devices (including your home router). Of course, you also need to be aware of what websites you visit and be careful about opening emails.

An attack that is similar to pharming is called malvertising. Malvertising involves incorporating malicious ads on trusted websites. Users who click these ads are inadvertently redirected to sites hosting malware.

Social Engineering Attacks

A social engineering attack leverages the weakest link in an organization, which is the human user. If an attacker can get a user to reveal information, it is much easier for the attacker to cause harm than it is by using some other method of reconnaissance. Social engineering can be accomplished through email or misdirection of web pages and prompting a user to click something that leads to the attacker gaining information. Social engineering can also be done in person by an insider or an outside entity or over the phone.

A primary example is attackers leveraging normal user behavior. Suppose that you are a security professional who is in charge of the network firewalls and other security infrastructure equipment in your company. An attacker could post a job offer for a very lucrative position and make it very attractive to you, the victim. Suppose the job description lists benefits and compensation far beyond what you are making at your company. You decide to apply for the position. The criminal (attacker) then schedules an interview with you. Because you are likely to “show off” your skills and work, the attacker may be able to get you to explain how you have configured the firewalls and other network infrastructure devices for your company. You might disclose information about the firewalls used in your network, how you have configured them, how they were designed, and so on. This would give the attacker a lot of knowledge about the organization without requiring the attacker to perform any type of scanning or reconnaissance on the network.

Email Phishing

With phishing, an attacker presents to a user a link or an attachment that looks like a valid, trusted resource. When the user clicks it, he or she is prompted to disclose confidential information such as his or her username and password. Example 4-1 shows an example of a phishing email.

Decorative

Example 4-1 Phishing Email Example

Subject: PAYMENT CONFIRMATION

Message Body:

Dear sir,
We have discovered that there are occasional delays from our accounts
department in making complete payments to our suppliers.
This has caused undue reduction in our stocks and in our production
department of which suppliers do not deliver materials on time.
The purpose of this letter is to confirm whether or not payment has
been made for the attached supplies received.
Kindly confirm receipt and advise.

Attachment: SD_085_085_pdf.xz / SD_085_085_pdf.exe
MD5 Checksum of the attachment: 0x8CB6D923E48B51A1CB3B080A0D43589D

Spear Phishing

Spear phishing is a phishing attempt that is constructed in a very specific way and directly targeted to specific groups of individuals or companies. The attacker studies a victim and the victim’s organization in order to be able to make emails look legitimate and perhaps make them appear to come from trusted users within the company. Example 4-2 shows an example of a spear phishing email.

Decorative

In the email shown in Example 4-2, the threat actor has become aware that Chris and Omar are collaborating on a book. The threat actor impersonates Chris and sends an email asking Omar to review a document (a chapter of the book). The attachment actually contains malware that is installed on Omar’s system.

Example 4-2 Spear Phishing Email Example

From: Chris Cleveland
To: Omar Santos
Subject: Please review chapter 3 for me and provide feedback by 2pm

Message Body:
Dear Omar,

Please review the attached document.

Regards,
Chris

Attachment: chapter.zip
MD5 Checksum of the attachment: 0x61D60EA55AC14444291AA1F911F3B1BE

Whaling

Whaling, which is similar to phishing and spear phishing, is an attack targeted at high-profile business executives and key individuals in a company. Like threat actors conducting spear phishing attacks, threat actors conducting whaling attacks also create emails and web pages to serve malware or collect sensitive information; however, the whaling attackers’ emails and pages have a more official or serious look and feel. Whaling emails are designed to look like critical business emails or emails from someone who has legitimate authority, either within or outside the company. In whaling attacks, web pages are designed to specifically address high-profile victims. In a regular phishing attack, the email might be a faked warning from a bank or service provider. In a whaling attack, the email or web page would be created with a more serious executive-level form. The content is created to target an upper manager such as the CEO or an individual who might have credentials for valuable accounts within the organization.

Decorative

The main goal in whaling attacks is to steal sensitive information or compromise the victim’s system and then target other key high-profile victims.

Vishing

Vishing (which is short for voice phishing) is a social engineering attack carried out in a phone conversation. The attacker persuades the user to reveal private personal and financial information or information about another person or a company.

Decorative

The goal of vishing is typically to steal credit card numbers, Social Security numbers, and other information that can be used in identity theft schemes. Attackers may impersonate and spoof caller ID to hide themselves when performing vishing attacks.

Short Message Service (SMS) Phishing

Because phishing has been an effective tactic for threat actors, they have found ways other than using email to fool their victims into following malicious links or activating malware from emails. Phishing campaigns often use text messages to send malware or malicious links to mobile devices.

Decorative

One example of Short Message Service (SMS) phishing is the bitcoin-related SMS scams that have surfaced in recent years. Numerous victims have received messages instructing them to click on links to confirm their accounts and claim bitcoin. When a user clicks such a link, he or she may be fooled into entering sensitive information on that attacker’s site.

You can help mitigate SMS phishing attacks by not clicking on links from any unknown message senders. Sometimes attackers spoof the identity of legitimate entities (such as your bank, your Internet provider, social media platforms, Amazon, or eBay). You should not click on any links sent via text messages if you did not expect such a message to be sent to you. For example, if you receive a random message about a problem with an Amazon order, do not click on that link. Instead, go directly to Amazon’s website, log in, and verify on the Amazon website whether there is a problem. Similarly, if you receive a message saying that there is a problem with a credit card transaction or a bill, call the bank directly instead of clicking on a link. If you receive a message telling you that you have won something, it’s probably an SMS phishing attempt, and you should not click the link.

Universal Serial Bus (USB) Drop Key

Many pen testers and attackers have used Universal Serial Bus (USB) drop key attacks to successfully compromise victim systems. This type of attack involves just leaving USB sticks (sometimes referred to as USB keys or USB pen drives) unattended or placing them in strategic locations. Oftentimes, users think that the devices are lost and insert them into their systems to figure out whom to return the devices to; before they know it, they are downloading and installing malware. Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.

Decorative

Research by Elie Bursztein, of Google’s anti-abuse research team, shows that the majority of users will plug USB drives in to their system without hesitation. As part of his research, he dropped close to 300 USB sticks on the University of Illinois Urbana–Champaign campus and measured who plugged in the drives. The results showed that 98% of the USB drives were picked up, and for 45% of the drives, someone not only plugged in the drive but clicked on files.

Another social engineering technique involves dropping a key ring containing a USB stick that may also include pictures of kids or pets and an actual key or two. These types of personal touches may prompt a victim to try to identify the owner in order to return the key chain. This type of social engineering attack is very effective and also can be catastrophic.

Watering Hole Attacks

A watering hole attack is a targeted attack that occurs when an attacker profiles websites that the intended victim accesses. The attacker then scans those websites for possible vulnerabilities. If the attacker locates a website that can be compromised, the website is then injected with a JavaScript or other similar code injection that is designed to redirect the user when the user returns to that site. (This redirection is also known as a pivot attack.) The user is then redirected to a site with some sort of exploit code. The purpose is to infect computers in the organization’s network, thereby allowing the attacker to gain a foothold in the network for espionage or other reasons.

Decorative

Watering hole attacks are often designed to profile users of specific organizations. Organizations should therefore develop policies to prevent these attacks. Such a policy might, for example, require updating anti-malware applications regularly and using secure virtual browsers that have little connectivity to the rest of the system and the rest of the network. To avoid having a website compromised as part of such an attack, an administrator should use proper programming methods and scan the organization’s website for malware regularly. User education is paramount to help prevent these types of attacks.

Physical Attacks

As a penetration tester or red teamer, you might be asked to simulate what a real-world threat actor or criminal can to do compromise an organization’s physical security in order to gain access to infrastructure, buildings, systems, and employees. In this section, you will learn about various types of physical attacks.

Tailgating

With piggybacking, an unauthorized person tags along with an authorized person to gain entry to a restricted area—usually with the person’s consent. Tailgating is essentially the same but with one difference: It usually occurs without the authorized person’s consent. Both piggybacking and tailgating can be defeated through the use of access control vestibules (formerly known as mantraps). An access control vestibule is a small space that can usually fit only one person. It has two sets of closely spaced doors; the first set must be closed before the other will open, creating a sort of waiting room where people are identified (and cannot escape). Access control vestibules are often used in server rooms and data centers. Multifactor authentication is often used in conjunction with an access control vestibule; for example, a proximity card and PIN may be required at the first door and a biometric scan at the second.

Decorative

Tip

An access control vestibule is an example of a preventive security control. Turnstiles, double entry doors, and security guards can also eliminate piggybacking and tailgating and help address confidentiality in general. These options tend to be less expensive and less effective than access control vestibules.

Dumpster Diving

With Dumpster diving, a person scavenges for private information in garbage and recycling containers. To protect sensitive documents, an organization should store them in a safe place as long as possible. When it no longer needs the documents, the organization should shred them. (Some organizations incinerate their documents or have them shredded by a certified professional third party.) Dumpster divers might find information on paper and on hard drives or removable media.

Decorative

Shoulder Surfing

With shoulder surfing, someone obtains information such as personally identifiable information (PII), passwords, and other confidential data by looking over a victim’s shoulder. One way to do this is to get close to a person and look over his or her shoulder to see what the person is typing on a laptop, phone, or tablet. It is also possible to carry out this type of attack from far away by using binoculars or even a telescope. These attacks tend to be especially successful in crowded places. In addition, shoulder surfing can be accomplished with small hidden cameras and microphones. User awareness and training are key to prevention. There are also special screen filters for computer displays to prevent someone from seeing the screen at an angle.

Decorative

Badge Cloning

Attackers can perform different badge cloning attacks. For example, an attacker can clone a badge/card used to access a building. Specialized software and hardware can be used to perform these cloning attacks. Attackers can also use social engineering techniques to impersonate employees or any other authorized users to enter a building by just creating their own badge and attempting to trick other users into letting them into a building. This could even be done without a full clone of the radio frequency (RF) capabilities of a badge.

Decorative

Tip

Attackers can often obtain detailed information about the design (look and feel) of corporate badges from social media websites such as Twitter, Instagram, and LinkedIn, when people post photos showing their badges when they get new jobs or leave old ones.

Social Engineering Tools

In Chapter 10, “Tools and Code Analysis,” you will learn more about the tools that can be used in penetration testing. For now, let’s quickly take a look at a few examples of tools that can be used in social engineering attacks.

Social-Engineer Toolkit (SET)

The Social-Engineer Toolkit (SET) is a tool developed by my good friend David Kennedy. This tool can be used to launch numerous social engineering attacks and can be integrated with third-party tools and frameworks such as Metasploit. SET is installed by default in Kali Linux and Parrot Security. However, you can install it on other flavors of Linux as well as on macOS. You can download SET from https://github.com/trustedsec/social-engineer-toolkit. The following steps demonstrate how to easily create a spear phishing email using SET:

Decorative

Step 1. Launch SET by using the setoolkit command. You see the menu shown in Figure 4-2.

A screenshot shows the terminal window with the Social-Engineer Toolkit main menu. The welcome to SET greeting lines are shown on top and the main menu is listed below it with serial numbers to select.

FIGURE 4-2 SET Main Menu

Step 2. Select 1) Social-Engineering Attacks from the menu to start the social engineering attack. You now see the screen shown in Figure 4-3.

A screenshot shows the terminal window with the Social-Engineer Toolkit main menu. The welcome to SET greeting lines are shown on top. The Social Engineering attack menu with 10 options are listed below it with serial numbers.

FIGURE 4-3 Social Engineering Attack Menu in SET

Step 3. Select 1) Spear-Phishing Attack Vectors from the menu to start the spear-phishing attack. You see the screen shown in Figure 4-4.

A screenshot shows the terminal window. The Spear-Phishing description is given and the menu for Spear-Phishing with 3 options are given below it.

FIGURE 4-4 Spear-Phishing Attack Menu

Step 4. To create a file format payload automatically, select 2) Create a FileFormat Payload. You see the screen shown in Figure 4-5.

A screenshot shows the terminal window. Create a file format payload option is selected and 22 file format exploit options are listed below it with serial numbers.

FIGURE 4-5 Creating a FileFormat Payload

Step 5. Select 13) Adobe PDF Embedded EXE Social Engineering as the file format exploit to use. (The default is the PDF embedded EXE.) You see the screen shown in Figure 4-6.

A screenshot shows the terminal window. The Adobe PDF embedded EXE Social Engineering option is selected from the list and 2 options are listed below to use own PDF or to use built-in blank PDF for attack.

FIGURE 4-6 Adobe PDF Embedded EXE Social Engineering

Step 6. To have SET generate a normal PDF with embedded EXE and use a built-in blank PDF file for the attack, select 2) Use built-in BLANK PDF for attack. You see the screen shown in Figure 4-7.

SET gives you the option to spawn a command shell on the victim machine after a successful exploitation. It also allows you to perform other post-exploitation activities, such as spawning a Meterpreter shell, Windows reverse VNC DLL, reverse TCP shell, Windows Shell Bind_TCP, and Windows Meterpreter Reverse HTTPS. Meterpreter is a post-exploitation tool that is part of the Metasploit framework. In Chapter 5, “Exploiting Wired and Wireless Networks,” you will learn more about the various tools that can be used in penetration testing.

A screenshot shows the terminal window. The option to use built-in blank PDF for attack is selected and the 7 options are listed below.

FIGURE 4-7 Configuring SET to Spawn a Windows Reverse TCP Shell on the Victim

Step 7. To use the Windows reverse TCP shell, select 1) Windows Reverse TCP Shell. You see the screen shown in Figure 4-8.

Step 8. When SET asks you to enter the IP address or the URL for the payload listener, select the IP address of your attacking system (192.168.88.225 in this example), which is the default option since it automatically detects your IP address. The default port is 443, but you can change it to another port that is not in use in your attacking system. In this example, TCP port 1337 is used. After the payload is generated, the screen shown in Figure 4-9 appears.

A screenshot shows the terminal window. The windows reverse TCP shell option from the list is selected and the payload generation to complete statements are shown below it.

FIGURE 4-8 Generating the Payload in SET

A screenshot shows the terminal window. From the 2 options to keep the filename and the rename the file, The second option to rename the file name is selected. The email attack single email address option and e-mail attack mass mailer option is listed.

FIGURE 4-9 Renaming the Payload

Step 9. When SET asks if you want to rename the payload, select 2. Rename the file, I want to be cool. and enter chapter2.pdf as the new name for the PDF file.

Step 10. Select 1. E-Mail Attack Single Email Address. The screen in Figure 4-10 appears.

A screenshot shows the terminal window. The email attack single email address option is selected and the Pre-defined template and one-time use email template options are shown below.

FIGURE 4-10 Using a One-Time Email Template in SET

Step 11. When SET asks if you want to use a predefined email template or create a one-time email template, select 2. One-Time Use Email Template.

Step 12. Follow along as SET guides you through the steps to create the one-time email message and enter the subject of the email.

Step 13. When SET asks if you want to send the message as an HTML message or in plaintext, select the default, plaintext.

Step 14. Enter the body of the message by typing or pasting in the text from Example 4-2, earlier in this chapter (see Figure 4-11).

A screenshot shows the terminal window. The one-time use email template option is selected and the

FIGURE 4-11 Sending the Email in SET

Step 15. Enter the recipient email address and specify whether you want to use a Gmail account or use your own email server or an open mail relay.

Step 16. Enter the “from” email address (the spoofed sender’s email address) and the “from name” the user will see.

Step 17. If you selected to use your own email server or open relay, enter the open-relay username and password (if applicable) when asked to do so.

Step 18. Enter the SMTP email server address and the port number. (The default port is 25.) When asked if you want to flag this email as a high-priority message, make a selection. The email is then sent to the victim.

Step 19. What asked if you want to set up a listener for the reverse TCP connection from the compromised system, make a selection.

Browser Exploitation Framework (BeEF)

In Chapter 6, “Exploiting Application-Based Vulnerabilities,” you will learn about web application vulnerabilities, such as cross-site scripting (XSS) and cross-site request forgery (CSRF). XSS vulnerabilities leverage input validation weaknesses on a web application. These vulnerabilities are often used to redirect users to malicious websites to steal cookies (session tokens) and other sensitive information. Browser Exploitation Framework (BeEF) is a tool that can be used to manipulate users by leveraging XSS vulnerabilities. You can download BeEF from https://beefproject.com or https://github.com/beefproject/beef.

Decorative

Figure 4-12 shows a screenshot of BeEF. The tool starts a web service on port 3000 by default. From there, the attacker can log in to a web console and manipulate users who are victims of XSS attacks.

A screenshot shows the Parrot terminal and the BeEF control panel.

FIGURE 4-12 Launching BeEF

Figure 4-13 shows a successful compromise in which the attacker has stolen the user’s session token (browser cookie).

A screenshot shows the BeEF control panel in a browser window.

FIGURE 4-13 Stealing a Browser Cookie Using XSS and BeEF

Once the system is compromised, the attacker can use BeEF to perform numerous attacks (including social engineering attacks). For example, the attacker can send fake notifications to the victim’s browser, as demonstrated in Figure 4-14.

Figure 4-15 shows the fake notification displayed in the victim’s browser.

A screenshot shows the BeEF control panel in a browser window.

FIGURE 4-14 Sending a Fake Notification to the Victim’s Browser Using BeEF

A screenshot show a browser window bookmarks section. A warning text that reads Authentication expired Please login at portal.h4cker.org is displayed below the bookmarks.

FIGURE 4-15 The Fake BeEF Notification in the Victim’s Browser

Call Spoofing Tools

You can very easily change the caller ID information that is displayed on a phone. There are several call spoofing tools that can be used in social engineering attacks.

The following are a few examples of call spoofing tools:

Decorative
  • SpoofApp: This is an Apple iOS and Android app that can be used to easily spoof a phone number.

  • SpoofCard: This is an Apple iOS and Android app that can spoof a number and change your voice, record calls, generate different background noises, and send calls straight to voicemail.

  • Asterisk: Asterisk is a legitimate voice over IP (VoIP) management tool that can also be used to impersonate caller ID.

Methods of Influence

The following are several motivation techniques/methods of influence used by social engineers:

  • Authority: A social engineer shows confidence and perhaps authority—whether legal, organizational, or social authority.

    Decorative
  • Scarcity and urgency: It is possible to use scarcity to create a feeling of urgency in a decision-making context. Specific language can be used to heighten urgency and manipulate the victim. Salespeople often use scarcity to manipulate clients (for example, telling a customer that an offer is only for today or that there are limited supplies). Social engineers use similar techniques.

  • Social proof: Social proof is a psychological phenomenon in which an individual is not able to determine the appropriate mode of behavior. For example, you might see others acting or doing something in a certain way and might assume that it is appropriate. Social engineers may take advantage of social proof when an individual enters an unfamiliar situation that he or she doesn’t know how to deal with. Social engineers may manipulate multiple people at once by using this technique.

  • Likeness: Individuals can be influenced by things or people they like. Social engineers strive for others to like the way they behave, look, and talk. Most individuals like what is aesthetically pleasing. People also like to be appreciated and to talk about themselves. Social engineers take advantage of these human vulnerabilities to manipulate their victims.

  • Fear: It is possible to manipulate a person with fear to prompt him or her to act promptly. Fear is an unpleasant emotion based on the belief that something bad or dangerous may take place. Using fear, social engineers force their victims to act quickly to avoid or rectify a dangerous or painful situation.

Exam Preparation Tasks

As mentioned in the section “How to Use This Book” in the Introduction, you have a couple choices for exam preparation: the exercises here, Chapter 11, “Final Preparation,” and the exam simulation questions in the Pearson Test Prep software online.

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 4-2 lists these key topics and the page number on which each is found.

Table 4-2 Key Topics for Chapter 4

Key Topic Element

Description

Page Number

Paragraph

Pretexting and impersonation

149

Paragraph

Phishing

152

Paragraph

Spear phishing

152

Paragraph

Whaling

153

Paragraph

Vishing

153

Section

Short Message Service (SMS) phishing

154

Section

Universal Serial Bus (USB) drop key

154

Paragraph

Watering hole attacks

155

Paragraph

Tailgating

156

Paragraph

Dumpster diving

156

Paragraph

Shoulder surfing

156

Section

Badge cloning

157

Section

Social-Engineer Toolkit (SET)

157

Section

Browser Exploitation Framework (BeEF)

167

List

Call spoofing tools

169

List

Methods of influence used by social engineers

170

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

pretexting

impersonation

phishing

spear phishing

whaling

vishing

short message service (SMS) phishing

Universal Serial Bus (USB) drop key

watering hole attack

tailgating

Dumpster diving

shoulder surfing

badge cloning attack

Social-Engineer Toolkit (SET)

Browser Exploitation Framework (BeEF)

call spoofing tool

authority

scarcity

social proof

likeness

fear

Q&A

The answers to these questions appear in Appendix A. For more practice with exam format questions, use the Pearson Test Prep software online.

1. Social proof is a ____________ used by social engineers?

2. What is another word for impersonation?

3. What is a very popular tool that can be used to launch different social engineering attacks including spear phishing, credential harvesting, and website attacks?

4. ____________ is a phishing attempt that is constructed in a very specific way and directly targeted to specific groups of individuals or companies.

5. In a(n) _________ attack, a user visits a legitimate website and clicks on a malicious ad. Then the user is redirected to a malicious site and inadvertently downloads malware.

6. What type of social engineering attack targets high-profile individuals and executives?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.242.253