SlideShare una empresa de Scribd logo
1 de 24
null Bangalore
THE DARK ARTS OF SOCIAL ENGINEERING
PRIMARY INFORMATION
• Name: Nutan Kumar Panda aka @TheOsintGuy
• Job Profile: Information Security Engineer
• Github Profile: https://github.com/nkpanda
• Co-author: Hacking Web Intelligence
• Hobbies: Riding bike, Playing keyboard, Watching
Movies
BLACK LIST AGENDA
• Phishing
• Vishing
• Pretexting
• Shoulder Surfing
• Dumpster diving
• Spamming
• Hacking Gmail/ Facebook/ Watsapp accounts
THE STORY BEHIND THIS PRESENTATION
WHAT IS SOCIAL ENGINEERING?
WHO ARE SOCIAL ENGINEERS?
WHY SOCIAL ENGINEERING?
WHERE IT IS WIDELY USED?
Social
Engineering
Espionage
Doxing
Scam
BASIC EXAMPLE
THE NEXT LEVEL
3 STEPS OF SOCIAL ENGINEERING
Create
Layout
Profile Attack
HOW TO CREATE A LAYOUT
POINTERS TO CREATE LAYOUT
Name
Peek You
Lullar
iSearch
Pipl
123 People
Spokeo
Usernames
and images
Check Usernames
KnowEm
Tineye
Google reverse image
search
Keyword
Social Mention
Omgili
Board Reader
THE PLAN B
Mr X
Children Relative Assistant Colleague
Legal
advisor
Wife GF
PROFILING
http://freemind.sourceforge.net/wiki/index.php/Main_Page
OLD SCHOOL STYLE
Vulnerable /
Stupid Victim
• Has no idea of your intentions
• Is a Remote target
• Little knowledge of computer and a bit trust on you
Trust
• Chatting with them regularly for at least for 3 weeks - 9
• Giving them something worth value for them – 10
• Make fun of someone together – 4
• Being a member of online group, page, forum – 8
• Sharing Common Interests - 8
• Helping them with problems - 9
Trust Points • About 20 You are good to attack
ATTACK
ESPIONAGE
DOX
SCAM
https://www.youtube.com/watch?v=_dj_90TnVbo
http://indianexpress.com/article/entertainment/bollywood/actor-karan-singh-
grover-falls-prey-to-nigerian-online-lottery-scam/
INTERESTING POINTERS
• https://www.trustwave.com/Resources/SpiderLabs-Blog/Hacking-a-Reporter--Writing-
Malware-For-Fun-and-Profit-(Part-1-of-3)/
• https://www.trustwave.com/Resources/SpiderLabs-Blog/Hacking-a-Reporter--UK-
Edition/?page=1&year=0&month=0
• http://www.welivesecurity.com/2015/12/22/manager-bikes-stolen-cycling-app-reveals-
home-address/
• http://readwrite.com/2010/08/23/i_can_stalk_u_new_site_posts_exacts_locations_of_twitt
er_users_posting_geotagged_photos
• http://www.buzzfeed.com/jimwaterson/your-iphone-knows-exactly-where-youve-been-and-
this-is-how-t#.wspQX53BD
• http://blog.ioactive.com/2014/05/glass-reflections-in-pictures-osint.html
SHARE LESS SURF MORE
• Do not share much information as public such that are associated with security questions.
• Do not use geo tag.
• Do not repeat a check in or a place you visit often in social media.
• Do not post pictures un necessarily.
• Do not reply mails, messages asking username/password/or verification code.
• Accept that you are not that lucky to get lottery which you never applied for.
• Do not download apps such as fb+ or linkedin+ which are not from the creators.
• Do not challenge or boast in social media, there are many legends of internet.
• Go enjoy you life and do not waste much on your virtual life.
ANY QUERIES?
THANKS

Más contenido relacionado

La actualidad más candente

Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 

La actualidad más candente (20)

Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017 DataSploit - BlackHat Asia 2017
DataSploit - BlackHat Asia 2017
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
What you need to know about OSINT
What you need to know about OSINTWhat you need to know about OSINT
What you need to know about OSINT
 
Rv defcon25 osint tactics on source code intelligence - simon roses
Rv defcon25   osint tactics on source code intelligence - simon rosesRv defcon25   osint tactics on source code intelligence - simon roses
Rv defcon25 osint tactics on source code intelligence - simon roses
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Stop pulling the plug
Stop pulling the plugStop pulling the plug
Stop pulling the plug
 
Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Maltego
MaltegoMaltego
Maltego
 
osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source IntelligenceOSINT x UCCU Workshop on Open Source Intelligence
OSINT x UCCU Workshop on Open Source Intelligence
 
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)Practical White Hat Hacker Training -  Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 

Destacado

Destacado (20)

Browser exploit framework
Browser exploit frameworkBrowser exploit framework
Browser exploit framework
 
Kali net hunter
Kali net hunterKali net hunter
Kali net hunter
 
Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015Threat intelligence - nullmeetblr 21st June 2015
Threat intelligence - nullmeetblr 21st June 2015
 
Radare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto JosephRadare2 - An Introduction by Anto Joseph
Radare2 - An Introduction by Anto Joseph
 
Grinder talk
Grinder talk Grinder talk
Grinder talk
 
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015Panel discussion   social engineering - manasdeep - nullmeetblr 21st June 2015
Panel discussion social engineering - manasdeep - nullmeetblr 21st June 2015
 
Csp july2015
Csp july2015Csp july2015
Csp july2015
 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
 
IOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H MeetIOS Security Basics - NULL/ OWASP/G4H Meet
IOS Security Basics - NULL/ OWASP/G4H Meet
 
Owasp m7-m8-shivang nullmeetblr 21june2015
Owasp m7-m8-shivang nullmeetblr 21june2015Owasp m7-m8-shivang nullmeetblr 21june2015
Owasp m7-m8-shivang nullmeetblr 21june2015
 
Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demo
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
Null bufferoverflow
Null bufferoverflowNull bufferoverflow
Null bufferoverflow
 
Owasp top 10
Owasp top 10 Owasp top 10
Owasp top 10
 
What is a VLAN and DMZ
What is a VLAN and DMZWhat is a VLAN and DMZ
What is a VLAN and DMZ
 
Social engineering-Sandy Suhling
Social engineering-Sandy SuhlingSocial engineering-Sandy Suhling
Social engineering-Sandy Suhling
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For Beginners
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 

Similar a Dark Arts Of Social Engineering

Intro to Social Media and Personal Brands by Ed Schipul
Intro to Social Media and Personal Brands by Ed SchipulIntro to Social Media and Personal Brands by Ed Schipul
Intro to Social Media and Personal Brands by Ed Schipul
Ed Schipul
 
Non profits and the Web - May the (social media) force be with you
Non profits and the Web - May the (social media) force be with youNon profits and the Web - May the (social media) force be with you
Non profits and the Web - May the (social media) force be with you
Ed Schipul
 
Social media for the job search
Social media for the job searchSocial media for the job search
Social media for the job search
Ben Thomas
 

Similar a Dark Arts Of Social Engineering (20)

Bug Bounty Career.pdf
Bug Bounty Career.pdfBug Bounty Career.pdf
Bug Bounty Career.pdf
 
Online Reputation Management: The Dark Side of Social Media
Online Reputation Management: The Dark Side of Social MediaOnline Reputation Management: The Dark Side of Social Media
Online Reputation Management: The Dark Side of Social Media
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Really Simple Strategies: Keeping Track of your Organization and Issues Online
Really Simple Strategies: Keeping Track of your Organization and Issues OnlineReally Simple Strategies: Keeping Track of your Organization and Issues Online
Really Simple Strategies: Keeping Track of your Organization and Issues Online
 
Viral is a Dirty Word
Viral is a Dirty WordViral is a Dirty Word
Viral is a Dirty Word
 
Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties Crypto Night at CSUS - Bug Bounties
Crypto Night at CSUS - Bug Bounties
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Intro to Social Media and Personal Brands by Ed Schipul
Intro to Social Media and Personal Brands by Ed SchipulIntro to Social Media and Personal Brands by Ed Schipul
Intro to Social Media and Personal Brands by Ed Schipul
 
The Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care ServicesThe Impact of Technology on Dementia Care Services
The Impact of Technology on Dementia Care Services
 
ISV SM Overview Trainng Bring It Home
ISV SM Overview Trainng Bring It HomeISV SM Overview Trainng Bring It Home
ISV SM Overview Trainng Bring It Home
 
i"Friends"
i"Friends"i"Friends"
i"Friends"
 
SX
SXSX
SX
 
How i hacked programer computer
How i hacked programer computerHow i hacked programer computer
How i hacked programer computer
 
Modthink Small Business Workshop - Sales Driven Digital Marketing
Modthink  Small Business Workshop - Sales Driven Digital MarketingModthink  Small Business Workshop - Sales Driven Digital Marketing
Modthink Small Business Workshop - Sales Driven Digital Marketing
 
The Seven Hackers v6
The Seven Hackers  v6The Seven Hackers  v6
The Seven Hackers v6
 
Non profits and the Web - May the (social media) force be with you
Non profits and the Web - May the (social media) force be with youNon profits and the Web - May the (social media) force be with you
Non profits and the Web - May the (social media) force be with you
 
Introduction to Social Media for business
Introduction to Social Media for businessIntroduction to Social Media for business
Introduction to Social Media for business
 
Socialsoftware
SocialsoftwareSocialsoftware
Socialsoftware
 
How to be more effective and efficient (via Tools)
How to be more effective and efficient (via Tools)How to be more effective and efficient (via Tools)
How to be more effective and efficient (via Tools)
 
Social media for the job search
Social media for the job searchSocial media for the job search
Social media for the job search
 

Más de Nutan Kumar Panda

Más de Nutan Kumar Panda (13)

Pentesting ReST API
Pentesting ReST APIPentesting ReST API
Pentesting ReST API
 
Rapid Android Application Security Testing
Rapid Android Application Security TestingRapid Android Application Security Testing
Rapid Android Application Security Testing
 
Win 8 password cracking
Win 8 password crackingWin 8 password cracking
Win 8 password cracking
 
Backtrack Manual Part9
Backtrack Manual Part9Backtrack Manual Part9
Backtrack Manual Part9
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Backtrack Manual Part7
Backtrack Manual Part7Backtrack Manual Part7
Backtrack Manual Part7
 
Backtrack Manual Part6
Backtrack Manual Part6Backtrack Manual Part6
Backtrack Manual Part6
 
Backtrack Manual Part5
Backtrack Manual Part5Backtrack Manual Part5
Backtrack Manual Part5
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
Backtrack Manual Part3
Backtrack Manual Part3Backtrack Manual Part3
Backtrack Manual Part3
 
Backtrack Manual Part2
Backtrack Manual Part2Backtrack Manual Part2
Backtrack Manual Part2
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Google Hack
Google HackGoogle Hack
Google Hack
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Último (20)

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Dark Arts Of Social Engineering