SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Social Penetration
                 Mike Bailey
                 Mike Murray
Social Engineering:

 The practice of obtaining
confidential information by
   manipulating users.

                   Source: Wikipedia
Social Media Applications are
 “applications that inherently
      connect people and
 information in spontaneous,
       interactive ways”

        Mark Drapeau and Linton Wells
       National Defense University (NDU)
The Tipping Point




                                                                      http://1.media.tumblr.com/iNIi9iwtqk9wp2rxEL7NpIPVo1_500.jpg

http://www.blogohblog.com/wp-content/pop/2008/03/facebook_chart.gif
The Vulnerability Cycle

              Human /
                                           Network
              Organization




                                                 Service /
          Client
                                                 Server



                             Application
Getting Penetrated


• Three Main Issues
  – We leak information
  – We are vulnerable to each other
  – The web browser
Information Leakage
Information Leakage
• Intentional or Ignorance
• We leak a million things
  – Images
  – GPS Coordinates
  – Picnic Flyers
  – Group Messages/Conversations
  – Job Postings
• If you can imagine it, you can find it.
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
User Vulnerability
Only two things are infinite: the
universe and human stupidity.
And I'm not sure about the former.
                          - Albert Einsten




 12
Human Vulnerability
• Humans are social creatures
• Human nature makes us vulnerable to each
  other
• Social engineers exploit weaknesses in
  human nature to obtain information or
  access
The Critical Faculty
• The hypnotist’s term for the part of the mind
  that acts as the rational alert system
  – Allows the human to act on largely unconscious
    process
  – Things raise to conscious awareness based on CF
    activation
• This suggests that all SE success is CF-related
  – Avoid activating critical-faculty
  – We want the person to execute a task that is
    inappropriate, yet fail to raise the CF alert to
    conscious awareness                                14
The Military Experiments
Would Military officers
disobey a direct order
under hypnosis?
Success in Social Engineering

Create a context that ensures
that the behavior we want is
  completely appropriate.
The Basics
• This is third grade English class:
  – Spelling
  – Grammar
  – Punctuation
• Most CF-activation is here
  – Taught as base of much Sec Awareness
    Training



                                 © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Awareness
• Words are meaningless without awareness of
  what is working
  – Your awareness of others acts as a compass
  – You need to see and hear the effect of your words
• Main components of awareness in face-to-face
  – Body language
  – Facial expressions
  – Language Tone
• How do we do this in technological social
 engineering?
                                       © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Tone Analysis of Writing
• As native speakers of English, we infer
  auditory tone into written word.

• Two main components:
  – Word choice
  – Punctuation


• Simple example

                                  © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Tone in SE
• Back to the prime rule
  – Tone needs to be natural and appropriate.


• Every situation has a tone and a feel for the
  writing that is unlikely to activate the CF.




                                      © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Actual Email from TD
Hello Michael Murray,

I appreciate your interest in viewing your TD Visa account information
using EasyWeb. Thank you for taking the time to write.

If you currently have an active EasyWeb profile but can not access your TD
Visa, you may have 2 separate customer profiles set up with TD Canada
Trust. For immediate assistance with correcting this situation, I
encourage you to call EasyLine toll free at 1-866-222-3456. A Banking
Specialist can combine your profiles if necessary, provided that the
personal information on both profiles match. Representatives are available
24 hours a day, 7 days a week. If you are not registered for EasyLine,
kindly press 2 and then 0 to speak with a representative. The combining
process usually takes about two days to complete, and once it is finished,
you should be able to view your entire personal portfolio via EasyWeb.
The Elements of Influence
• Cialdini and others have found that creating a frame with
  certain elements can enhance influence
   –   Reciprocity
   –   Authority
   –   Social Proof
   –   Confirmation
   –   Scarcity / Urgency
   –   Emotional / Amygdala hijack
   –   Confusion
• Inserting these elements within a frame can strengthen
  influence
   – These are natural human responses
   – We use these responses to create a context for influence
                                                 © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Confirmation
• Confirmation Bias
  – That which confirms what we already
    believe, we tend to believe.
  – That which fails to confirm what we already
    believe, we tend to ignore.

• The brain LITERALLY turns off
  – No CF activation

                                 © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
During the run-up to the 2004 presidential election, while undergoing an fMRI bran scan, 30 men--
half self-described as "strong" Republicans and half as "strong“ Democrats--were tasked with
assessing statements by both George W. Bush and John Kerry in which the candidates clearly
contradicted themselves. . Not surprisingly, in their assessments Republican subjects were as critical
of Kerry as Democratic subjects were of Bush, yet both let their own candidate off the hook….

The neuroimaging results, however, revealed that…


"We did not see any increased activation of the parts of
  the brain normally engaged during reasoning"


      From: http://resonancetechnologies.com/press/articles/ThePoliticalBrain.pdf
Confirmation in SE
• Signal Theory
  – Branch of economics relating to the
    messages passed by inference
  – E.g. A CEH is a signal that you have chosen
    the path of an EH
• We need to give appropriate signals
  – Tone
  – Language
  – Appearance
                                © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
Back to TD
Hello Michael Murray,

I appreciate your interest in viewing your TD Visa account information using EasyWeb. Thank you for taking the time to write.

If you currently have an active EasyWeb profile but can not access your TD Visa, you may have 2 separate customer profiles set up with TD Canada Trust. For
immediate assistance with correcting this situation, I encourage you to call EasyLine toll free at 1-866-222-3456. A Banking Specialist can combine your profiles if
necessary, provided that the personal information on both profiles match. Representatives are available 24 hours a day, 7 days a week. If you are not registered for
EasyLine, kindly press 2 and then 0 to speak with a representative. The combining process usually takes about two days to complete, and once it is finished, you
should be able to view your entire personal portfolio via EasyWeb.

Best regards,

Debra Matsumoto
Internet Correspondence Representative
________________________________________
TD Canada Trust 1-866-222-3456
http://www.tdcanadatrust.com
Email: customer.service@td.com
TDD (Telephone Device for the Deaf) 1-800-361-1180

This email is directed to, and intended for the exclusive use of, the addressee indicated above. TD Canada Trust endeavours to provide accurate and up-to-date
information relating to its products and services. However, please note that rates, fees and information are subject to change.
We create relationships through trading value.
   Temporary inequality creates powerful bonds.
Reciprocity == Investment
• The act of exchanging value
  – I can do something for you
  – You can do something for me.
• Both acts strengthen our bond.
  – We become more invested in the relationship
  – The more invested a person feels, the more likely they
    are to be influenced by the relationship
• This is the Nigerian scam’s overwhelming
  power
                      32
Scarcity
• People will take almost any opportunity for
  their own gain
  – Especially if the opportunity seems scarce
  – If we have to hurry, the amygdala takes over
• This is a marketing tactic
  – Infomercials
  – Scams


                                                   34
“If you call in the next 15 minutes…”
         Ron Popeil
Web Browsers
Web Browsers
•   Malicious Links
•   Credential Theft
•   XSS
•   CSRF
•   Abusing websites, not systems
So much more we could discuss…

        So little time.

Keep an eye on: MadSecInc.com

Email us: mmurray@madsecinc.com
     mbailey@madsecinc.com

Contenu connexe

Tendances

Privacy Culture
Privacy CulturePrivacy Culture
Privacy CultureBrian Rowe
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2Brian Rowe
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 

Tendances (19)

Privacy Culture
Privacy CulturePrivacy Culture
Privacy Culture
 
Privacy Culture V 2
Privacy Culture V 2Privacy Culture V 2
Privacy Culture V 2
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Similaire à Social Penetration Techniques and the Psychology of Influence

Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyMike Murray
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)Mike Murray
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's RevengeMike Murray
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPKathy Swanson
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptx
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptxBB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptx
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptxssuser3d9304
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917Evan Francen
 
Social Media 101
Social Media 101Social Media 101
Social Media 101Ugur Arcan
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and designRai University
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 

Similaire à Social Penetration Techniques and the Psychology of Influence (20)

Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Social engineering and indian jugaad
Social engineering and indian jugaadSocial engineering and indian jugaad
Social engineering and indian jugaad
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)
BSides Rhode Island 2013 - Bite the Wax Tadpole (with Katrina Rodzon)
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's Revenge
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOP
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptx
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptxBB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptx
BB Triatmoko, SJ, MA, MBA, Emerging Management Issues and Challenges.pptx
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
Mba ewis ii u ii planning and design
Mba ewis ii u ii  planning and designMba ewis ii u ii  planning and design
Mba ewis ii u ii planning and design
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 

Plus de Security B-Sides

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atlSecurity B-Sides
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c Security B-Sides
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Security B-Sides
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonSecurity B-Sides
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity B-Sides
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Security B-Sides
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...Security B-Sides
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineSecurity B-Sides
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsSecurity B-Sides
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldSecurity B-Sides
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?Security B-Sides
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the faceSecurity B-Sides
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Security B-Sides
 

Plus de Security B-Sides (20)

Lord of the bing b-sides atl
Lord of the bing   b-sides atlLord of the bing   b-sides atl
Lord of the bing b-sides atl
 
The road to hell v0.6
The road to hell v0.6The road to hell v0.6
The road to hell v0.6
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c 2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
Tastes Great vs Less Filling: Deconstructing Risk Management (A Practical App...
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Risk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex HuttonRisk Management - Time to blow it up and start over? - Alex Hutton
Risk Management - Time to blow it up and start over? - Alex Hutton
 
Security? Who cares! - Brett Hardin
Security? Who cares! - Brett HardinSecurity? Who cares! - Brett Hardin
Security? Who cares! - Brett Hardin
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...Computing Risk without Numbers:  A Semantic Approach to Risk Metrics - Tim Ke...
Computing Risk without Numbers: A Semantic Approach to Risk Metrics - Tim Ke...
 
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio VaccineThe Great Compliance Debate: No Child Left Behind or The Polio Vaccine
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
 
Dominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource toolsDominique Karg - Advanced Attack Detection using OpenSource tools
Dominique Karg - Advanced Attack Detection using OpenSource tools
 
2009 Zacon Haroon Meer
2009 Zacon  Haroon  Meer2009 Zacon  Haroon  Meer
2009 Zacon Haroon Meer
 
Enterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the GoldEnterprise Portals - Gateway to the Gold
Enterprise Portals - Gateway to the Gold
 
From fishing to phishing to ?
From fishing to phishing to ?From fishing to phishing to ?
From fishing to phishing to ?
 
Getting punched in the face
Getting punched in the faceGetting punched in the face
Getting punched in the face
 
Make Tea Not War
Make Tea Not WarMake Tea Not War
Make Tea Not War
 
OWASP Proxy
OWASP ProxyOWASP Proxy
OWASP Proxy
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)
 
Exploitation
ExploitationExploitation
Exploitation
 
Layer 2 Hackery
Layer 2 HackeryLayer 2 Hackery
Layer 2 Hackery
 

Social Penetration Techniques and the Psychology of Influence

  • 1. Social Penetration Mike Bailey Mike Murray
  • 2. Social Engineering: The practice of obtaining confidential information by manipulating users. Source: Wikipedia
  • 3. Social Media Applications are “applications that inherently connect people and information in spontaneous, interactive ways” Mark Drapeau and Linton Wells National Defense University (NDU)
  • 4. The Tipping Point http://1.media.tumblr.com/iNIi9iwtqk9wp2rxEL7NpIPVo1_500.jpg http://www.blogohblog.com/wp-content/pop/2008/03/facebook_chart.gif
  • 5. The Vulnerability Cycle Human / Network Organization Service / Client Server Application
  • 6. Getting Penetrated • Three Main Issues – We leak information – We are vulnerable to each other – The web browser
  • 8. Information Leakage • Intentional or Ignorance • We leak a million things – Images – GPS Coordinates – Picnic Flyers – Group Messages/Conversations – Job Postings • If you can imagine it, you can find it.
  • 9.
  • 10. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 12. Only two things are infinite: the universe and human stupidity. And I'm not sure about the former. - Albert Einsten 12
  • 13. Human Vulnerability • Humans are social creatures • Human nature makes us vulnerable to each other • Social engineers exploit weaknesses in human nature to obtain information or access
  • 14. The Critical Faculty • The hypnotist’s term for the part of the mind that acts as the rational alert system – Allows the human to act on largely unconscious process – Things raise to conscious awareness based on CF activation • This suggests that all SE success is CF-related – Avoid activating critical-faculty – We want the person to execute a task that is inappropriate, yet fail to raise the CF alert to conscious awareness 14
  • 15. The Military Experiments Would Military officers disobey a direct order under hypnosis?
  • 16. Success in Social Engineering Create a context that ensures that the behavior we want is completely appropriate.
  • 17. The Basics • This is third grade English class: – Spelling – Grammar – Punctuation • Most CF-activation is here – Taught as base of much Sec Awareness Training © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 18.
  • 19. Awareness • Words are meaningless without awareness of what is working – Your awareness of others acts as a compass – You need to see and hear the effect of your words • Main components of awareness in face-to-face – Body language – Facial expressions – Language Tone • How do we do this in technological social engineering? © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 20. Tone Analysis of Writing • As native speakers of English, we infer auditory tone into written word. • Two main components: – Word choice – Punctuation • Simple example © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 21. Tone in SE • Back to the prime rule – Tone needs to be natural and appropriate. • Every situation has a tone and a feel for the writing that is unlikely to activate the CF. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 22.
  • 23. Actual Email from TD Hello Michael Murray, I appreciate your interest in viewing your TD Visa account information using EasyWeb. Thank you for taking the time to write. If you currently have an active EasyWeb profile but can not access your TD Visa, you may have 2 separate customer profiles set up with TD Canada Trust. For immediate assistance with correcting this situation, I encourage you to call EasyLine toll free at 1-866-222-3456. A Banking Specialist can combine your profiles if necessary, provided that the personal information on both profiles match. Representatives are available 24 hours a day, 7 days a week. If you are not registered for EasyLine, kindly press 2 and then 0 to speak with a representative. The combining process usually takes about two days to complete, and once it is finished, you should be able to view your entire personal portfolio via EasyWeb.
  • 24. The Elements of Influence • Cialdini and others have found that creating a frame with certain elements can enhance influence – Reciprocity – Authority – Social Proof – Confirmation – Scarcity / Urgency – Emotional / Amygdala hijack – Confusion • Inserting these elements within a frame can strengthen influence – These are natural human responses – We use these responses to create a context for influence © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 25. Confirmation • Confirmation Bias – That which confirms what we already believe, we tend to believe. – That which fails to confirm what we already believe, we tend to ignore. • The brain LITERALLY turns off – No CF activation © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 26. During the run-up to the 2004 presidential election, while undergoing an fMRI bran scan, 30 men-- half self-described as "strong" Republicans and half as "strong“ Democrats--were tasked with assessing statements by both George W. Bush and John Kerry in which the candidates clearly contradicted themselves. . Not surprisingly, in their assessments Republican subjects were as critical of Kerry as Democratic subjects were of Bush, yet both let their own candidate off the hook…. The neuroimaging results, however, revealed that… "We did not see any increased activation of the parts of the brain normally engaged during reasoning" From: http://resonancetechnologies.com/press/articles/ThePoliticalBrain.pdf
  • 27. Confirmation in SE • Signal Theory – Branch of economics relating to the messages passed by inference – E.g. A CEH is a signal that you have chosen the path of an EH • We need to give appropriate signals – Tone – Language – Appearance © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved
  • 28. Back to TD Hello Michael Murray, I appreciate your interest in viewing your TD Visa account information using EasyWeb. Thank you for taking the time to write. If you currently have an active EasyWeb profile but can not access your TD Visa, you may have 2 separate customer profiles set up with TD Canada Trust. For immediate assistance with correcting this situation, I encourage you to call EasyLine toll free at 1-866-222-3456. A Banking Specialist can combine your profiles if necessary, provided that the personal information on both profiles match. Representatives are available 24 hours a day, 7 days a week. If you are not registered for EasyLine, kindly press 2 and then 0 to speak with a representative. The combining process usually takes about two days to complete, and once it is finished, you should be able to view your entire personal portfolio via EasyWeb. Best regards, Debra Matsumoto Internet Correspondence Representative ________________________________________ TD Canada Trust 1-866-222-3456 http://www.tdcanadatrust.com Email: customer.service@td.com TDD (Telephone Device for the Deaf) 1-800-361-1180 This email is directed to, and intended for the exclusive use of, the addressee indicated above. TD Canada Trust endeavours to provide accurate and up-to-date information relating to its products and services. However, please note that rates, fees and information are subject to change.
  • 29.
  • 30.
  • 31. We create relationships through trading value. Temporary inequality creates powerful bonds.
  • 32. Reciprocity == Investment • The act of exchanging value – I can do something for you – You can do something for me. • Both acts strengthen our bond. – We become more invested in the relationship – The more invested a person feels, the more likely they are to be influenced by the relationship • This is the Nigerian scam’s overwhelming power 32
  • 33.
  • 34. Scarcity • People will take almost any opportunity for their own gain – Especially if the opportunity seems scarce – If we have to hurry, the amygdala takes over • This is a marketing tactic – Infomercials – Scams 34
  • 35. “If you call in the next 15 minutes…” Ron Popeil
  • 36.
  • 37.
  • 39. Web Browsers • Malicious Links • Credential Theft • XSS • CSRF • Abusing websites, not systems
  • 40.
  • 41.
  • 42.
  • 43. So much more we could discuss… So little time. Keep an eye on: MadSecInc.com Email us: mmurray@madsecinc.com mbailey@madsecinc.com