Social Engineering, The Art of Human Hacking
Social Engineering, The Art of Human Hacking
Social Engineering, The Art of Human Hacking
Mohammed Asad Hashmi [email protected] School of Electronics and Computer Science, University of Southampton
Abstract
Uses of antivirus programs and anti spyware programs, protect our data and provides security from hackers and their technical expertise. But now hackers have advanced their skill, now they not only rely and use their technical skills but also utilize and exploit human skills to con. Now they study human habits and behaviour to exploit their weaknesses in order to gain access to information way easier and cheaper, and thus are termed as social engineers. This technical report looks deep into the working of social engineering, how is social engineering so successful? What methods do social engineers employ to exploit a victim? And then we look into the research being done to detect and defend against this attack.
use of social networking websites, lots of information about a person can be gathered from social networking websites (SNS). Moreover SNSs provide data in machine readable form, thus helping the automation of attacks. [2]. Social engineering attacks have a high success rate due to limited education and meagre awareness regarding social engineering [3].
1. Introduction
Security is not a technological problem anymore. Earlier use of antivirus and firewall programs enhanced the security of the organization to a mighty level. But that is not the case anymore, meagre use of antivirus and firewall programs is not enough for the security of an organization. Developers continually invent and enhance security technologies making it difficult to exploit technical vulnerabilities. What remains easily exploitable is the human element [1]. Cracking the human element is easy, requires just a phone call and has minimal risk [1]. Social engineering is the art of exploiting the human factor of security. Victims are deceived to let in confidential information to the attackers or perform malicious actions [2]. Social engineering usually starts with acquiring background information of the target. The initial information is gathered via phone calls, dumpster diving etc. But now due to emerging
networkings websites help in the automation of attacks, by maintaining data in machine readable format [18]. The goal of automation is to reduce the time spent on information gathering by a human, as developing and maintaining a rapport with the victim is a time consuming task and hence the attack becomes expensive [7]. Tools such as Social Engineering Toolkit make it easy for the attacker to automate an attack with any preferred method [15].
f)
can contain personal information, credit card details or companys organizational chart which aids in the information gathering for an attack. Phishing: Phishing is the technique of attempting to gain information such as passwords, usernames, credit card numbers etc. by masquerading as an authorized and trustworthy entity. An exact of replica of a website of an authorized firm is made and the user is persuaded and trick into entering valuable information, which the attacker utilizes for personal benefits. Vishing is the practice of leveraging IP-based voice messaging technologies (primarily Voice over Internet Protocol, or VoIP) to socially engineer the intended victim into providing personal, financial or other confidential information for the purpose of financial reward. The term vishing is derived from a combination of voice and phishing. [29][30].
attack
We hereby discuss social engineering detection model (SEADM) [8] as illustrated in Figure 1[8]. It is often difficult for an individual to make rational decisions in a limited time frame. With the complexity of the attack and the skill of the social engineer, an individual can only make an educated guess regarding the likelihood of an attack. What an individual would need is a predefined set of guidelines to determine the likelihood of an attack. This model suggests a practical application model to determine if a social engineering attack is being
performed. [8] The model specifies a set of guidelines in the form of a flowchart in order to determine an attack. Though it is said to detect, there is more of prevention involved, because by any means if it is felt that there is a level of discomfort in providing the required information, it is advised to elevate the request. [8]
(POI) with both written and oral conversations with the help of ontological semantics [9].The person of interest (POI) is the attacker who gathers information for the attack. This system understands Natural language (NL) text to extract and calculate
information that POI gives away unintentionally. For example suppose the POI, in one conversation mentions that he went to Florida on vacation, and in another mentions The Birth of Venus was worth seeing. The system detects the contradiction in the conversation by understanding natural language and with the help of access to an encyclopaedia and specific knowledge about paintings. (The Birth of Venus is in Florence, Italy, not Florida). OST consists of repositories of linguist knowledge and repositories of world used to disambiguate different meanings of words and sentences. They contain language independent knowledge and concept, one lexicon per language which is used to represent their meaning along with the Proper Name Dictionary (PND), which contains names of people, organizations, countries etc. along with their description, interlinking them with other PND entries. (StAn), Semantic Text Analyzer is software that produces text meaning representations (TMRs) from text that it processes. The TMRs are fed into InfoStore, a knowledge resource of Ontological semantic technology, from which information is processed and reasoned according to the requirements to be determined which in our case is to detect contradictions in conversations. [9] 4.3 Social attacks detection using Neural
check if use of neural networks can be useful for the same. ii) Extracting Features from the call This stage identifies certain attributes and features from the phone call or the caller which would help the system to easily identify whether is it an SE attack. This is done by identifying keywords, which are used in numerical training vectors to be used for neural network learning, fed for neural network processing. iii)Feed features to NN(Neural Networks) Matlab NN toolbox is used for this process. The extracted information is fed into with the appropriate data tuning and a minimum training error is sort after. Training error determines the ability of the NN box to detect SE attacks. [11] Drawbacks: Carried out on an experimental data set and not real case scenarios. Heavy cost involved to integrate this model into all call centres.
Networks
Figure 2 The term Neural Networks refers to the computational model which depicts the biological neurons in the human brain. [10]. A neural node is programmed to act as a biological neuron. This model works in 3 steps in figure 2.[10] i)Benchmark Data A data set was generated by [8]Dr.Marcus Rogers, in Cyber Forensics Program at Purdue University who proposed a solution which relies on computer systems to analyze telephonic conversations to detect if the receiver is being deceived. Here benchmark data is used in order to
References 1. Hacking Human: Data-Archaeology and Surveillance in Social Networks. Jason Nolan and Michelle Levesque ACM SIGGROUP Bulletin Special issue on virtual communities Volume 25 Issue 2, February 2005, Pages 33-37 2. Towards Automating Social Engineering Using Social Networking Sites Huber, M.; Kowalski, S.; Nohlberg, M.; Tjoa, S.; This paper appears in: Computational Science and Engineering, 2009. CSE '09. International Conference on Issue Date: 29-31 Aug. 2009 On page(s): 117 - 124 3. The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition . Derek Kyedar , Michael nettis , Steven P. Fulton .Journal of computing sciences in colleges Volume 26 Issue 2 ,December 2010 Pages 80-87 4. Social Engineering: The Dark Art. Tim Thornburgh.InfoSecCD 2004 Proceedings of the 1st annual conference on Information security curriculum development. Pages 133-135 the 2010 workshop on New security paradigms.Pages 115-128 9. V. Rao and H. Rao, C++ Neural Networks and Fuzzy Logic, MIS Press, New York, 1993. 10. Social Engineering Detection using Neural Networks. Sandouka, H.; Cullen, A.J.; Mann, I.; This paper appears in: CyberWorlds, 2009. CW '09. International Conference on Issue Date: 7-11 Sept. 2009 On page(s): 273 - 278 11. A Framework for Conceptualizing Social Engineering Attacks. Jose J. Gonzalez, Jose M. Sarriegi and Alazne Gurrutxaga Critical Information Infrastructures Security First International Workshop, CRITIS 2006, Samos, Greece, August 31 - September 1, 2006. Revised Papers 12. An attack vector for deception through persuasion used by hackers and crackers. Hasan, M.I.; Prajapati, N.B.; This paper appears in: Networks and Communications, 2009. NETCOM '09. First International Conference on Issue Date: 27-29 Dec. 2009 On page(s): 254 - 258 13. Preventing Social Engineering in Ubiquitous Environment. Nyamsuren, E.; Ho-Jin Choi; This paper appears in: Future Generation Communication and Networking (FGCN 2007) Issue Date: 6-8 Dec. 2007 On page(s): 573 - 577 14. Social Engineering Toolkit - A Systematic Approach to Social Engineering. Pavkovic, N.; Perkov, L.; This paper appears in: MIPRO, 2011 Proceedings of the 34th International Convention Issue Date: 23-27 May 2011 On page(s): 1485 - 1489 15. Cheap and Automated Socio-Technical Attacks based on Social Networking Sites. Markus Huber,Martin Mulazzani,Sebastian crittwieser,Edgar Weippl. AISec 2010 Proceedings of the 3rd ACM workshop on Artificial intelligence and security. Pages 61-64 16. Social Engineering in Information Assurance Curricula. Douglas P. Twitchell. InfoSecCD '06
5. An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Tiantian Qi; This paper appears in: Intelligence and Security Informatics, 2007 IEEE Issue Date: 23-24 May 2007 On page(s): 152 - 159 6. Analysis of a Social Engineering Threat to Information Security Exacerbated by Vulnerabilities Exposed Through the Inherent Nature of Social Networking Websites. David mills InfoSec 2009 Information Security Curriculum Development Conference .Pages 139-141. 7. Social Engineering Attack Detection Model: SEADM. Bezuidenhout, M.; Mouton, F.; Venter, H.S.; This paper appears in: Information Security for South Africa (ISSA), 2010 Issue Date: 2-4 Aug. 2010 On page(s): 1 - 8
8. Ontological Semantic Technology for Detecting Insider Threat and Social Engineering. Victor Ruskin and Julia M. Taylor. NSPW 20120 Proceedings of
Proceedings of the 3rd annual conference on Information security curriculum development. Pages 191-193. 17. Data Retrieval from Online Social Network Profiles for Social Engineering Applications. Alim, S.; Abdul-Rahman, R.; Neagu, D.; Ridley, M.; This paper appears in: Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for Issue Date: 9-12 Nov. 2009 On page(s): 1 - 5 18. Case study on social engineering techniques for persuasion. Mosin Hasan, Nilesh Prajapati, Safvan Vohara. International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.2 (2010) Pages: 17-23 19.Social engineering based attacks : Model and new Zealand perspective. Proceedings of the International Multiconference on Computer Science and Information Technology pp. 847853 20. Security Analysis of Information Systems taking into account Social Engineering Attacks. Kotenko, I.; Stepashkin, M.; Doynikova, E.; This paper appears in: Parallel, Distributed and NetworkBased Processing (PDP), 2011 19th Euromicro International Conference on Issue Date: 9-11 Feb. 2011 On page(s): 611 - 618 21. Hacking tricks toward security on network environments. Tzer-Shyong Chen; Fuh-Gwo Jeng; Yu-Chia Liu; This paper appears in: Parallel and Distributed Computing, Applications and Technologies, 2006. PDCAT '06. Seventh International Conference on Issue Date: Dec. 2006 On page(s): 442 - 447 22. A Low-cost Secure Schemes for Authentications and Access Control with the Use of Multiple Public IC Cards. Kuo-Yi Chen; Chin-Yang Lin; Ting-Wei Hou; This paper appears in: Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on Issue Date: 20-22 Aug. 2010 On page(s): V3-609 - V3-613 23. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems .Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill . CITC5
04 : Proceedings of the 5th conference on Information technology education.Pages 177-181 24. Two methodologies for physical penetration testing using social engineering .Trajce Dimkov, Andr van Cleeff, Wolter Pieters, Pieter Hartel. ACSAC10:Proceedings of the 26th Annual Computer Security Applications Conference.Pages 399-408 25. Social engineering: a serious underestimated problem.Guido Rling, Marius Mller.ITiCSE 09:Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education.Pages 384-384 26. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers by Kevin D. Mitnick and William L. Simon . ISBN: 978-0764569593.Wiley 27. K. Mitnick, W.L. Simon, The Art of Deception: Controlling the Human Element of Security, John Wiley and Sons, October 2002 28.The Vishing Guide, G Ollmann - IBM Global Technology Services, 2007 29.Vishing. Slade E. Griffin, Casey C. Rackley .InfoSecCD 08 Proceedings of the 5th annual conference on Information security curriculum development.Pages 33-35 . 30. Phishing: Phishing. Anti-phishing software, Confidence trick, E-mail spoofing, Pharming, Social engineering (security), Vishing, Transport Layer Security, Phreaking, Copyright infringement of software ,John McBrester, Frederic P. Miller , Agnes F. Vandome . Alpha Press 31. A social-engineering-centric data collection initiative to study phishing Federico Maggi,Alessandro Sisto,Stefane Zanero. BADGERS 11 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. Pages 107-108