Social Engineering
Social Engineering is an art of human exploitation. Exploiting the human itself to gets sensitive information. Social engineering play very big role in the hacking and penetration testing. A good needs to be a good social engineering. Social engineering is a vast topic itself. If a hacker is good at social engineering, hacking a thing is not a big deal for him.
An attacker manipulates the user in order to get sensitive information using social engineering. Social engineering may be human based or tool based. Both kind of social engineering may be an important role. If an attacker is able to manipulate the customer services or receptionist of a company, he can get some sort of sensitive information from there. Hence social engineering is a vast field, by which simply manipulate a target, an attacker can compromise and gain much of sensitive information to perform further hack. There are varieties of books available on social engineering itself.
Social engineering can be performed online or live in persons. Now a days, fake emails, fake mobile calls and messages, etc. are used to get the information from the target. For ex, an attacker calls the target and says hello, I am from XYZ Company, You have things. They ask for your personal information in order to avail this money. Now at last sometimes they give you a number to call and avail you lottery amount. During this they already have performed social engineering attack and gained your personal information. Many scammers who try to thug a person to get benefited. Hence it is advised to be aware before acting to a particular thing.
A human is the weakest part of any company. Exploiting the human by manipulating can give tons of sensitive information and sometimes even access to the network of company. There is no solution to fix the level of human manipulation. Hence the whole corporate network is vulnerable. Simply manipulating a person can provide huge information disclosure, the person may be directly or indirectly related to the company, may be the peon or clerk or maybe an officer at higher post.
There is no such role of post in the social engineering. Social engineering totally depends upon the manipulating skills of an attacker, if he is good at manipulating or convincing a person, he can compromise into the whole network, without actually performing Hack.
A. hacker-----------------------------> Social Engineering
Process of Social Engineering:
1. Analysis:
2. Selection:
3. Maintain relationship:
4. Attack:
Computer-Based Social Engineering
1. E-Mail :-
2. Ads and Pop-up screen:
3. Phishing:
For-Ex:
A person receives an email that XYZ Company is launching an application. Apply for the beta-tester of the application and there is al ink present to login and download the application Users generally gets happy by seeing that he got a chance to test the application for everyone. Now, once he opens the link and registers successfully, the page shows some message like "oops...."!! you missed the chance, We have already closed the beta-tester application". Generally, the user ignores and takes it as consequence but actually, he is victimised of phishing and social engineering.
Phishing Process:
Types of phishing Attacks:
1. Man in the middle attack (MITM):
In MITM, the Attacker sits between the source and destination Attacker monitors and sniffs the activities of the target and tries to get the credentials. MITM can be performed over HTTP as well as HTTPS. Generally, the user is redirected to a proxy server and a real proxy is not used which makes this attack more successful. The proxy may be of any type but the attacker avoids the user using a real proxy.
2. Cross-site scripting(XSS):
An XSS attack is generally performed by injecting code injection in the URL parameters or input data field. Generally, XSS is carried out by URL formatting. Xss may be persistence or DOM-based. CSS is counted in the top 10 vulnerability list according to owasp to 10 2013.
3. URL Redirection:
The attacker shares a link to the target user which on opening redirects to the phishing page attackercker tries to keep the link as similar as the original so that there are fewer chances of being caught. This is one of the traditional methods of performing phishing attacks. Generally, user shares such links over personal chats or emails.
4. Site Cloning:
5. Keylogger or malware Based:
- Fake Search Engine
- Client-Side Attack
- DNS Redirection Attack