WEBVTT

00:00.210 --> 00:05.140
Social engineering attacks have been around since well since before the Internet.

00:05.430 --> 00:10.860
Now in this episode what I want to do is go through a lot of social engineering attacks and if you get

00:10.860 --> 00:14.230
on the Internet you've probably seen a number of these personally.

00:14.430 --> 00:19.020
Now for personal organization I like to separate them into two types.

00:19.020 --> 00:26.070
First what I call physical attacks which basically means to real people being either face to face or

00:26.070 --> 00:28.260
very close to being face to face.

00:28.380 --> 00:33.660
And then we have another group which I call virtual attacks which is usually e-mails Web sites stuff

00:33.660 --> 00:36.300
like that so this is my own personal separation.

00:36.300 --> 00:38.230
Don't look for this on the exam.

00:38.370 --> 00:41.340
Now to show you physical attacks.

00:41.340 --> 00:46.560
We actually shot a wonderful video a couple of years back that covers it absolutely perfectly.

00:46.560 --> 00:47.910
And they had a lot of fun too.

00:47.910 --> 00:52.370
So these are all the guys at total seminars including my buddy Scott Jernigan.

00:52.410 --> 00:57.140
So they shot this wonderful video on what I'm going to call physical attacks.

01:04.850 --> 01:05.260
Hello.

01:05.290 --> 01:07.470
This is to attack the white speaking.

01:07.710 --> 01:08.400
I Dwight.

01:08.450 --> 01:12.660
This is Jim from the IQ department doing a company wide password reset.

01:12.710 --> 01:15.990
So we need to get everyone's old password in order to reset them.

01:16.400 --> 01:19.210
You'll get a password reset notification when you log in tomorrow.

01:19.550 --> 01:24.370
Sure thing Jim my old password is Baer's beats Battlestar Galactica.

01:24.530 --> 01:27.000
That's all lowercase with no spaces.

01:27.170 --> 01:28.310
Thanks so much Dwight.

01:28.490 --> 01:33.670
We'll get that change right away.

01:34.000 --> 01:34.670
There's

01:37.970 --> 01:43.520
beats a man tells his password to his company's I.T. department.

01:43.760 --> 01:45.550
Seems harmless enough.

01:45.620 --> 01:51.970
They say that a trusting nature is a virtue but they also say that a sucker born every minute.

01:52.040 --> 01:56.960
We'd all like to think that male hackers typing way in dank basements pose the greatest threat to our

01:56.960 --> 01:58.200
networks.

01:58.220 --> 02:04.550
It's an evil we can understand a threat that feels contained but we live in a world where evil doers

02:04.550 --> 02:10.670
prey on our virtues turning them against us telephone scams like the one you just witnessed or phishing

02:10.670 --> 02:12.470
attacks using e-mail pervert.

02:12.470 --> 02:18.200
Our willingness to be agreeable and trusting malicious elements pretend to be trusted authorities in

02:18.200 --> 02:23.690
the hopes that users will willingly hand over precious passwords and users do.

02:23.690 --> 02:27.150
It turns out that we are the greatest threat to our networks.

02:27.200 --> 02:31.120
It's just the sort of twist you'd expect in the social engineering.

02:31.110 --> 02:31.470
So

02:40.730 --> 02:46.190
no one likes to be cooped up indoors all day but the unwary may fall victim to the predictions of devious

02:46.190 --> 02:52.310
tailgaters these malicious malcontents follow legitimate employees through locked doors pretending that

02:52.310 --> 02:54.710
they belong to thwart them.

02:54.710 --> 02:57.260
Make sure no one's following you through a locked door.

02:57.410 --> 03:03.980
If someone tries make them show you some form of ID or even produce a key for the door you're going

03:03.980 --> 03:04.660
through.

03:04.940 --> 03:09.570
You might feel comfortable leaving your office computer unattended and unlocked.

03:09.800 --> 03:13.170
After all your coworkers are trustworthy aren't they.

03:13.610 --> 03:18.890
However on gaining access to a secure building all a tailgater has to do is wait for someone to take

03:18.890 --> 03:24.580
a bathroom break to gain complete access to an otherwise impenetrable network.

03:24.800 --> 03:27.800
Consider it vital to lock your computer when you walk away from it.

03:28.040 --> 03:30.110
Even if it's just for a short time.

03:30.260 --> 03:33.550
Also make sure your user account is password protected.

03:33.800 --> 03:39.620
If you think that locking your computer is a sure protection against wrongdoers think again why wait

03:39.620 --> 03:45.700
for you to get up for a break when it's just as easy to stand behind you and watch over your shoulder.

03:45.770 --> 03:51.980
They'll watch you as you type passwords access secure documents and communicate with other employees.

03:52.010 --> 03:56.360
Always make sure there's not a stranger's shoulder surfing behind you.

03:56.510 --> 04:01.730
If the prospect of looking over your shoulder all day sounds Honoris invest in a screen filter which

04:01.730 --> 04:06.420
makes it impossible to see what's on your screen unless you're right in front of it.

04:06.470 --> 04:11.410
Even the most tightly controlled offices often have an Achilles heel.

04:11.570 --> 04:15.730
Dumpster diving criminals are as shameless and stinky lot.

04:15.800 --> 04:20.510
Not at all above digging through trash to find sensitive information.

04:20.540 --> 04:27.400
Companies have toppled individuals have had identity stolen all by being careless with their refuse.

04:27.650 --> 04:31.370
Make sure to shred any trash that you don't want prying eyes to see.

04:31.400 --> 04:35.640
After all one man's trash is another man's treasure.

04:37.650 --> 04:42.550
We often find it comforting to ignore the dangers that surround us on all sides.

04:42.630 --> 04:46.330
The world we live in however will brook no such fictions.

04:46.680 --> 04:54.660
The unaware and the naive become victims of widely ruthless criminals who forever stalk the social engineering

04:54.670 --> 04:55.160
zone

05:01.850 --> 05:03.620
those guys had a lot of fun shooting that.

05:03.620 --> 05:06.260
And did you notice I in a part of it too.

05:06.260 --> 05:11.840
Anyway the other thing I want to talk about now is what I organize into virtual attack so virtual attacks

05:11.870 --> 05:17.000
generally mean that we're having some type of Internet media e-mail Web sites or something like that

05:17.000 --> 05:18.250
that come into play.

05:18.440 --> 05:25.070
So let's go ahead and march through the different types of what I call virtual social engineering attacks

05:25.280 --> 05:26.670
that you're going to see on the exam.

05:26.690 --> 05:32.300
First is fishing fishing and our e-mails that are used to steal personal information.

05:32.320 --> 05:33.750
Are incredibly common.

05:33.800 --> 05:35.670
So let's take a look at this example.

05:35.720 --> 05:39.890
First of all notice that it's not addressed to me it's more generally addressed.

05:39.950 --> 05:45.310
Secondly it straight up asked for a username and password for me to type in right there.

05:45.470 --> 05:50.850
All legitimate sources now know that we never directly asked for usernames and passwords.

05:52.030 --> 05:55.420
Next is spearfishing in spearfishing.

05:55.420 --> 06:01.390
What we're talking about is phishing that is directed towards a specific person or organization.

06:01.390 --> 06:06.020
Here's an example that I recently got in my own personal e-mail.

06:06.140 --> 06:12.210
Whaling is spearfishing specifically directed towards senior management and executives.

06:12.280 --> 06:15.030
A good Spearfish works hard to look like something important.

06:15.030 --> 06:19.900
These folks like a subpoena or maybe a critical memorandum.

06:19.900 --> 06:24.580
This thing uses the telephone system to steal private information.

06:24.610 --> 06:29.230
We've probably all got one of these types of calls they often use automated systems.

06:29.230 --> 06:32.070
Have you ever got a phone call that sounds something like this.

06:32.110 --> 06:37.540
No we have an important message for you from the IRS your tax return has been audited and below two

06:37.540 --> 06:41.530
thousand three hundred seventeen dollars and seventy four cents in back taxes.

06:41.620 --> 06:43.520
You need to make a payments immediately.

06:43.530 --> 06:48.550
Banks will receive a notice of levy on your account please and to the last four digits of your social

06:48.550 --> 06:50.550
security number to pay the full amount.

06:50.560 --> 06:52.690
Speak with an IRS agent.

06:52.720 --> 06:59.380
Next is a hoax a hoax attack warns that something bad is happening that really is it most commonly virus

06:59.380 --> 07:00.310
warnings.

07:00.310 --> 07:03.600
Here's an example of a very common web based hoax.

07:03.640 --> 07:05.560
A bet you've seen this one before.

07:05.710 --> 07:13.600
A watering hole attack looks for places usually Web sites that a group of specific people frequent.

07:13.690 --> 07:19.930
It exploits the Web site or tries to redirect them to another server to infect the visiting systems

07:19.930 --> 07:21.460
computers.

07:21.460 --> 07:24.510
From there they can do just about anything they want.

07:24.520 --> 07:29.830
Make sure you're comfortable with the definition of each one of these social engineering attacks.

07:29.950 --> 07:34.760
The exam goes into great detail challenging you to make sure you can recognize them.
