SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Pwning People through Technology Mike Murray Hacker Halted USA 2009 9/24/09
Mike Murray A decade of experience in penetration testing, vulnerability research and social engineering CISO of Foreground Security (ForegroundSecurity.com) - leads penetration tests and security services engagements  Lead trainer and curriculum developer at Foreground’s training division The Hacker Academy (TheHackerAcademy.com) Managing partner of Michael Murray and Associates, where he directs diverse stealth-mode security industry projects. Security blogger (Episteme.ca), podcaster, and regular speaker on social engineering, vulnerability management and the human side of security. Founder of Information Security Leaders, the leading resource on information security careers (InfoSecLeaders.com) Certified Hypnotherapist and Master NLP Practitioner 3 3
4 Only two things are infinite: the universe and human stupidity. And I'm not sure about the former. - Albert Einsten
5 Social Engineering:The practice of obtaining confidential information by manipulating users. Source:  Wikipedia
Human Vulnerability Humans are social creatures Human nature makes us vulnerable to each other Social engineers exploit weaknesses in human nature to obtain information or access 6
7 That Sounds Familiar
8 Mesmer Erickson Elman Brown Ponzi Angel Irving Abagnale Weill Houdini Jermay Con Men Magicians Hypnotists
Why Now? 9
1985 1990 1993 10
Vulnerability Environment: ,[object Object]
 UDP Denial of Service
 Smurf attacks
 Teardrop
 LandAugust 24, 1995  November 8, 1996 October 13, 1994  1997 1994 11
Major Vulnerabilities in: ,[object Object]
Sendmail
Sadmind
 Apache
 IIS
 Wu-FTPD
Tooltalk
 IMAP
 POP
 SQL Server
Statd, CDEMajor Worms: ,[object Object]
Nimda
SQL Slammer
MS Blaster1998 2000 2003 12
2003 2006 2009 13
14 Human / Organization Network Service / Server Client Application The Vulnerability Cycle
Penetration Test Success We spend a huge amount of time on the exploit Books written on XSS, XSRF and buffer overflows Very little research on how to get people to exploit themselves Nearly all of our tests rely on that ability Successful ethical hacking is successful SE Far too little SE is discussed 15
The Critical Faculty The hypnotist’s term for the part of the mind that acts as the rational alert system Allows the human to act on largely unconscious process Things raise to conscious awareness based on CF activation This suggests that all SE success is CF-related Avoid activating critical-faculty We want the person to execute a task that is inappropriate, yet fail to raise the CF alert to conscious awareness 16
The Military Experiments Would Military officers disobey a direct order under hypnosis? 17
Rule #1 Create a context that ensures that the behavior we want is completely appropriate. 18
19 The Three Skills Critical Faculty is bypassed through three fundamental skills: Artful Communication and Use of Language Awareness of the Target Frame Control The skills are the same when online Language You must have  structure your language to effect control of your target Awareness You must know how your target will interpret your communication  Frame Control Your ability to control the context of your communication will be the largest component of suppressing the CF
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Communication The art of communication Language is the first skill of the social engineer Ability to craft words is first step in influence Language is not real Incomplete representation of reality Incompleteness creates opportunity Dual Purpose of Language Information Transfer Influence
Precision Information Transfer is hindered by the incompleteness of language Deletion Distortion Generalization Presupposition
Influence Influence is about maintaining agreement Avoiding CF activation This is about the amygdala The goal is to change representation without triggering disagreement Disagreement is the mind’s defense against inappropriate influence. This is not about rhetorical/logical disagreement Agreement allows  The artful inversion of precision Use of deletion, distortion and generalization to maintain agreement Sometimes referred to as being “artfully vague”
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved The Basics This is third grade English class: Spelling Grammar Punctuation Most CF-activation is here Taught as base of much Sec Awareness Training
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Awareness Words are meaningless without awareness of what is working Your awareness of others acts as a compass You need to see and hear the effect of your words Main components of awareness in face-to-face Body language Facial expressions Language Tone How do we do this in technological social engineering?
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Tone Analysis of Writing As native speakers of English, we infer auditory tone into written word. Two main components: Word choice Punctuation Simple example
Due to the mystery surrounding social engineering many people are afraid of it, or they feel they will never be able to accomplish a successful social engineering test. However, every time you try to get someone to do something that is in your interest, you are engaging in social engineering. From children trying to get a toy from their parents to adults trying to land a job or score the big promotion, all of it is a form of social engineering. Introduction tohttp://www.social-engineer.org
Many people are afraid of social engineering due to its mystery.  Perhaps they feel they will never be able to accomplish a successful social engineering test. However, you are engaging in social engineering whenever you try to influence someone to act in your interest.  All of these are forms of social engineering:	 ,[object Object]
 trying to land a job
 score the big promotionParaphrased fromhttp://www.social-engineer.org
Many people are afraid of social engineering.  They fear they won’t succeed at a social engineering test. But you are engaging in social engineering whenever you try to influence someone to act in your interest. Examples: ,[object Object]
 trying to land a job
 score the big promotionParaphrased fromhttp://www.social-engineer.org
© 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Tone in SE Back to the prime rule Tone needs to be natural and appropriate. Every situation has a tone and a fel for the writing that is unlikely to activate the CF.

Weitere ähnliche Inhalte

Was ist angesagt?

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security PresentationJonathan Ezor
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Evan Francen
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Legal Aspects Relating to Social Media in the Workplace
Legal Aspects Relating to Social Media in the WorkplaceLegal Aspects Relating to Social Media in the Workplace
Legal Aspects Relating to Social Media in the WorkplaceBrian Bluff
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemEvan Francen
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies David Strom
 

Was ist angesagt? (13)

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Legal Aspects Relating to Social Media in the Workplace
Legal Aspects Relating to Social Media in the WorkplaceLegal Aspects Relating to Social Media in the Workplace
Legal Aspects Relating to Social Media in the Workplace
 
Content server
Content serverContent server
Content server
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
 

Ähnlich wie Hacker Halted 2009 - Owning People through Technology

WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemSecurityStudio
 
Textbook ALONG THESE LINES Writing Paragraphs
Textbook ALONG THESE LINES Writing ParagraphsTextbook ALONG THESE LINES Writing Paragraphs
Textbook ALONG THESE LINES Writing ParagraphsCynthia Wilson
 
Agile and Generative AI - friends or foe?
Agile and Generative AI - friends or foe?Agile and Generative AI - friends or foe?
Agile and Generative AI - friends or foe?Emiliano Soldi
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docx
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docxRunning head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docx
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docxtodd271
 
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnCammy Bean
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
WANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemWANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemEvan Francen
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasEvan Francen
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPKathy Swanson
 
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia..."Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...Blend Interactive
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
Simple Essay On Himachal Pradesh
Simple Essay On Himachal PradeshSimple Essay On Himachal Pradesh
Simple Essay On Himachal PradeshSharon Lopez
 

Ähnlich wie Hacker Halted 2009 - Owning People through Technology (20)

WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Textbook ALONG THESE LINES Writing Paragraphs
Textbook ALONG THESE LINES Writing ParagraphsTextbook ALONG THESE LINES Writing Paragraphs
Textbook ALONG THESE LINES Writing Paragraphs
 
Agile and Generative AI - friends or foe?
Agile and Generative AI - friends or foe?Agile and Generative AI - friends or foe?
Agile and Generative AI - friends or foe?
 
Social engineering
Social engineering Social engineering
Social engineering
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docx
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docxRunning head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docx
Running head DEPRESSION AMONG MILLENIALS1DEPRESSION AMONG M.docx
 
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Be an Ogre
Be an OgreBe an Ogre
Be an Ogre
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
WANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemWANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language Problem
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware Dallas
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOP
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia..."Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Simple Essay On Himachal Pradesh
Simple Essay On Himachal PradeshSimple Essay On Himachal Pradesh
Simple Essay On Himachal Pradesh
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Hacker Halted 2009 - Owning People through Technology

  • 1.
  • 2. Pwning People through Technology Mike Murray Hacker Halted USA 2009 9/24/09
  • 3. Mike Murray A decade of experience in penetration testing, vulnerability research and social engineering CISO of Foreground Security (ForegroundSecurity.com) - leads penetration tests and security services engagements Lead trainer and curriculum developer at Foreground’s training division The Hacker Academy (TheHackerAcademy.com) Managing partner of Michael Murray and Associates, where he directs diverse stealth-mode security industry projects. Security blogger (Episteme.ca), podcaster, and regular speaker on social engineering, vulnerability management and the human side of security. Founder of Information Security Leaders, the leading resource on information security careers (InfoSecLeaders.com) Certified Hypnotherapist and Master NLP Practitioner 3 3
  • 4. 4 Only two things are infinite: the universe and human stupidity. And I'm not sure about the former. - Albert Einsten
  • 5. 5 Social Engineering:The practice of obtaining confidential information by manipulating users. Source: Wikipedia
  • 6. Human Vulnerability Humans are social creatures Human nature makes us vulnerable to each other Social engineers exploit weaknesses in human nature to obtain information or access 6
  • 7. 7 That Sounds Familiar
  • 8. 8 Mesmer Erickson Elman Brown Ponzi Angel Irving Abagnale Weill Houdini Jermay Con Men Magicians Hypnotists
  • 11.
  • 12. UDP Denial of Service
  • 15. LandAugust 24, 1995 November 8, 1996 October 13, 1994 1997 1994 11
  • 16.
  • 26.
  • 27. Nimda
  • 31. 14 Human / Organization Network Service / Server Client Application The Vulnerability Cycle
  • 32. Penetration Test Success We spend a huge amount of time on the exploit Books written on XSS, XSRF and buffer overflows Very little research on how to get people to exploit themselves Nearly all of our tests rely on that ability Successful ethical hacking is successful SE Far too little SE is discussed 15
  • 33. The Critical Faculty The hypnotist’s term for the part of the mind that acts as the rational alert system Allows the human to act on largely unconscious process Things raise to conscious awareness based on CF activation This suggests that all SE success is CF-related Avoid activating critical-faculty We want the person to execute a task that is inappropriate, yet fail to raise the CF alert to conscious awareness 16
  • 34. The Military Experiments Would Military officers disobey a direct order under hypnosis? 17
  • 35. Rule #1 Create a context that ensures that the behavior we want is completely appropriate. 18
  • 36. 19 The Three Skills Critical Faculty is bypassed through three fundamental skills: Artful Communication and Use of Language Awareness of the Target Frame Control The skills are the same when online Language You must have structure your language to effect control of your target Awareness You must know how your target will interpret your communication Frame Control Your ability to control the context of your communication will be the largest component of suppressing the CF
  • 37. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Communication The art of communication Language is the first skill of the social engineer Ability to craft words is first step in influence Language is not real Incomplete representation of reality Incompleteness creates opportunity Dual Purpose of Language Information Transfer Influence
  • 38. Precision Information Transfer is hindered by the incompleteness of language Deletion Distortion Generalization Presupposition
  • 39. Influence Influence is about maintaining agreement Avoiding CF activation This is about the amygdala The goal is to change representation without triggering disagreement Disagreement is the mind’s defense against inappropriate influence. This is not about rhetorical/logical disagreement Agreement allows The artful inversion of precision Use of deletion, distortion and generalization to maintain agreement Sometimes referred to as being “artfully vague”
  • 40. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved The Basics This is third grade English class: Spelling Grammar Punctuation Most CF-activation is here Taught as base of much Sec Awareness Training
  • 41.
  • 42. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Awareness Words are meaningless without awareness of what is working Your awareness of others acts as a compass You need to see and hear the effect of your words Main components of awareness in face-to-face Body language Facial expressions Language Tone How do we do this in technological social engineering?
  • 43. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Tone Analysis of Writing As native speakers of English, we infer auditory tone into written word. Two main components: Word choice Punctuation Simple example
  • 44. Due to the mystery surrounding social engineering many people are afraid of it, or they feel they will never be able to accomplish a successful social engineering test. However, every time you try to get someone to do something that is in your interest, you are engaging in social engineering. From children trying to get a toy from their parents to adults trying to land a job or score the big promotion, all of it is a form of social engineering. Introduction tohttp://www.social-engineer.org
  • 45.
  • 46. trying to land a job
  • 47. score the big promotionParaphrased fromhttp://www.social-engineer.org
  • 48.
  • 49. trying to land a job
  • 50. score the big promotionParaphrased fromhttp://www.social-engineer.org
  • 51. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Tone in SE Back to the prime rule Tone needs to be natural and appropriate. Every situation has a tone and a fel for the writing that is unlikely to activate the CF.
  • 52.
  • 53. Actual Email from TD Hello Michael Murray,I appreciate your interest in viewing your TD Visa account informationusing EasyWeb. Thank you for taking the time to write.If you currently have an active EasyWeb profile but can not access your TDVisa, you may have 2 separate customer profiles set up with TD CanadaTrust.  For immediate assistance with correcting this situation, Iencourage you to call EasyLine toll free at 1-866-222-3456. A BankingSpecialist can combine your profiles if necessary, provided that thepersonal information on both profiles match. Representatives are available24 hours a day, 7 days a week. If you are not registered for EasyLine,kindly press 2 and then 0 to speak with a representative. The combiningprocess usually takes about two days to complete, and once it is finished,you should be able to view your entire personal portfolio via EasyWeb.
  • 54. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Frame Control Cognitive Frames Wikipedia: ”the inevitable process of selective influence over the individual's perception of the meanings attributed to words or phrases. Framing defines the packaging of an element of rhetoric in such a way as to encourage certain interpretations and to discourage others” The frame is the context in which the content of an interaction occurs Physical Frame control Transformation Extension / Contraction Combination Amplification / Compression
  • 55. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved The Elements of Influence Cialdini and others have found that creating a frame with certain elements can enhance influence Reciprocity Authority Social Proof Confirmation Scarcity / Urgency Emotional / Amygdala hijack Confusion Inserting these elements within a frame can strengthen influence These are natural human responses We use these responses to create a context for influence
  • 57. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Confirmation Confirmation Bias That which confirms what we already believe, we tend to believe. That which fails to confirm what we already believe, we tend to ignore. The brain LITERALLY turns off No CF activation
  • 58. During the run-up to the 2004 presidential election, while undergoing an fMRI bran scan, 30 men--half self-described as "strong" Republicans and half as "strong“ Democrats--were tasked with assessing statements by both George W. Bush and John Kerry in which the candidates clearly contradicted themselves. . Not surprisingly, in their assessments Republican subjects were as critical of Kerry as Democratic subjects were of Bush, yet both let their own candidate off the hook…. The neuroimaging results, however, revealed that… "We did not see any increased activation of the parts of the brain normally engaged during reasoning" From: http://resonancetechnologies.com/press/articles/ThePoliticalBrain.pdf
  • 59. © 2008 – Foreground Security, Michael Murray & Associates, LLC. All rights reserved Confirmation in SE Signal Theory Branch of economics relating to the messages passed by inference E.g. A CEH is a signal that you have chosen the path of an EH We need to give appropriate signals Tone Language Appearance
  • 60. Back to TD Hello Michael Murray,I appreciate your interest in viewing your TD Visa account information using EasyWeb. Thank you for taking the time to write.If you currently have an activeEasyWebprofile but can not access your TD Visa, you may have 2 separate customer profiles set up with TD Canada Trust.  For immediate assistance with correcting this situation, I encourage you to call EasyLine toll free at 1-866-222-3456. A Banking Specialist can combine your profiles if necessary, provided that the personal information on both profiles match. Representatives are available 24 hours a day, 7 days a week. If you are not registered for EasyLine, kindly press 2 and then 0 to speak with a representative. The combining process usually takes about two days to complete, and once it is finished, you should be able to view your entire personal portfolio via EasyWeb. Best regards,Debra MatsumotoInternet Correspondence Representative________________________________________TD Canada Trust 1-866-222-3456http://www.tdcanadatrust.comEmail: customer.service@td.comTDD (Telephone Device for the Deaf) 1-800-361-1180This email is directed to, and intended for the exclusive use of, the addressee indicated above. TD Canada Trust endeavours to provide accurate and up-to-date information relating to its products and services. However, please note that rates, fees and information are subject to change.
  • 61.
  • 62.
  • 64. 43 We create relationships through trading value. Temporary inequality creates powerful bonds.
  • 65. Reciprocity == Investment The act of exchanging value I can do something for you You can do something for me. Both acts strengthen our bond. We become more invested in the relationship The more invested a person feels, the more likely they are to be influenced by the relationship This is the Nigerian scam’s overwhelming power 44
  • 66.
  • 68. Scarcity People will take almost any opportunity for their own gain Especially if the opportunity seems scarce If we have to hurry, the amygdala takes over This is a marketing tactic Infomercials Scams 47
  • 69. Ron Popeil “If you call in the next 15 minutes…”
  • 70.
  • 71.
  • 72. So much more we could discuss…So little time.Keep an eye on:ForegroundSecurity.comEpisteme.caEmail me: mmurray@episteme.ca

Hinweis der Redaktion

  1. The information security world exists on an incredibly short (20 year) timeframe - Even taking a *REALLY* long view, the entire Infosec industry extends only back as far as the mid-80s - AROUND 20 YEARS.Those were the daysSoftware Vulnerabilities weren’t significant - most based on configuration weaknessOnly a handful of people understood how to exploit technologiesSmall Target Surface - Few internet-connected computersFocus was on phone phreaking and academia Social Engineering reigned supremeMost successful attacks involved social engineeringUnsophisticated controls environmentsFew understood the jargonPolicies encouraged trust over security
  2. Two Vital DatesOctober 13, 1994Mosaic Netscape 0.9 releasedThe web becomes easy to navigateAugust 24, 1995Windows 95 ReleasedHome computer use proliferates massivelyThe Internet Experiences exponential growthMoney starts to change handsInternet connected computers become a viable targetThis created a target rich environment...Phrack 49 - November 8, 1996.Aleph1 - Smashing the Stack for Fun and ProfitThe first real sophisticated vulnerabilities start to emergeA buffer overflow required knowledge of assembly and coding skillHackers now had to be more technicalReadily available exploit code actually makes breaking in to computers easierThe “golden age” of server hacking begins.1996-2003 - More of the sameMemory attacks become more sophisticatedPolymorphic shell-code designed to evade detective controlsMore advanced use of memory spaces (format strings, integer exploits) Windows XP Service Pack 2 AppearsMicrosoft finally hardens their operating systemsThe world changes overnightSecurity is now baked in to the computer.Server based vulnerabilities disappearAs massive server-based vulnerabilities disappear, client interaction becomes keyThe number of issues continues to increase, but the type of issues starts to change radicallySince 2005No major direct-exploitation worm outbreaksLess than a handful of “remote root” direct exploitation vulnerabilitiesMajor Classes of AttacksDrive-by DownloadExploitation through EmailExploitation through Social Networking SitesPhishing / Pharming / Spear-PhishingWhat’s the similarity?If you said “human interaction”, you get a gold star.
  3. Two Vital DatesOctober 13, 1994Mosaic Netscape 0.9 releasedThe web becomes easy to navigateAugust 24, 1995Windows 95 ReleasedHome computer use proliferates massivelyThe Internet Experiences exponential growthMoney starts to change handsInternet connected computers become a viable targetThis created a target rich environment...Phrack 49 - November 8, 1996.Aleph1 - Smashing the Stack for Fun and ProfitThe first real sophisticated vulnerabilities start to emergeA buffer overflow required knowledge of assembly and coding skillHackers now had to be more technicalReadily available exploit code actually makes breaking in to computers easierThe “golden age” of server hacking begins.1996-2003 - More of the sameMemory attacks become more sophisticatedPolymorphic shell-code designed to evade detective controlsMore advanced use of memory spaces (format strings, integer exploits) Windows XP Service Pack 2 AppearsMicrosoft finally hardens their operating systemsThe world changes overnightSecurity is now baked in to the computer.Server based vulnerabilities disappearAs massive server-based vulnerabilities disappear, client interaction becomes keyThe number of issues continues to increase, but the type of issues starts to change radicallySince 2005No major direct-exploitation worm outbreaksLess than a handful of “remote root” direct exploitation vulnerabilitiesMajor Classes of AttacksDrive-by DownloadExploitation through EmailExploitation through Social Networking SitesPhishing / Pharming / Spear-PhishingWhat’s the similarity?If you said “human interaction”, you get a gold star.
  4. Two Vital DatesOctober 13, 1994Mosaic Netscape 0.9 releasedThe web becomes easy to navigateAugust 24, 1995Windows 95 ReleasedHome computer use proliferates massivelyThe Internet Experiences exponential growthMoney starts to change handsInternet connected computers become a viable targetThis created a target rich environment...Phrack 49 - November 8, 1996.Aleph1 - Smashing the Stack for Fun and ProfitThe first real sophisticated vulnerabilities start to emergeA buffer overflow required knowledge of assembly and coding skillHackers now had to be more technicalReadily available exploit code actually makes breaking in to computers easierThe “golden age” of server hacking begins.1996-2003 - More of the sameMemory attacks become more sophisticatedPolymorphic shell-code designed to evade detective controlsMore advanced use of memory spaces (format strings, integer exploits) Windows XP Service Pack 2 AppearsMicrosoft finally hardens their operating systemsThe world changes overnightSecurity is now baked in to the computer.Server based vulnerabilities disappearAs massive server-based vulnerabilities disappear, client interaction becomes keyThe number of issues continues to increase, but the type of issues starts to change radicallySince 2005No major direct-exploitation worm outbreaksLess than a handful of “remote root” direct exploitation vulnerabilitiesMajor Classes of AttacksDrive-by DownloadExploitation through EmailExploitation through Social Networking SitesPhishing / Pharming / Spear-PhishingWhat’s the similarity?If you said “human interaction”, you get a gold star.
  5. Watkins, EstabrooksEstabrooks: “I can hypnotize a man — without his knowledge or consent — into committing treason against the United States”
  6. Confirmation – what lawyer would ever use that subject line?
  7. Checks on your familyPut trust in you Requests your help