SlideShare una empresa de Scribd logo
1 de 36
Social Engineering Trickx
Michael Hendrickx
Doha, Qatar. 23 Nov 2015
$ whoami
• Michael Hendrickx
– Security Analyst in HelpAG
– Working in infosec for past decade
– mhendrickx@owasp.org
– Belgian
Social Engineering
• You have a firewall, good for you.
– Let’s target the users, not systems
• Human beings are helpful by nature
• Defined as:
“Any act that influences a person to take an action
that may or may not be in their best interest”
Find people Find Info Get access
Finding people
• 2 Ways of finding people:
– Phishing (casting a net)
• Quantity over quality
• Very noisy
– Spear phishing (targeted)
• Quality over quantity
• Takes more time, more effort
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Recent “Rombertik” malware:
- State of the art malware (evil though)
- 97% of code never called
- sandbox confusion
- browser snooping
- MBR destruction upon debug-detection
- Lame Ineffective distribution
Finding people: phishing
• Phishing not always best option
– Very noisy
– ISP / Hosting company may block you
– Too many recipients
• Somebody is bound to report it
Spear phishing is a better option
Finding people: spear phishing
• Email from somebody
who “knows you”
– You probably know them too
• Somebody who took
time to research you
• Interested in you
– Rather, what you know
– Who you know
– What you have access to.
Finding people
• Target a domain, find its users:
– Maltego, theHarvester, metasploit, recon-ng
Emails are probably:
firstname.lastname@helpag.com
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
https://ae.linkedin.com/in/nsolling
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
Let’s dig just a bit further….
https://ae.linkedin.com/in/nsolling
Study the target: Nicolai Solling
Study the target: Nicolai Solling
We know Nicolai’s writing style
More target studying
• Examine digital footprint
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Interests:
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL550
• Trivial Pursuit
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL55
• Trivial Pursuit
So far, what do we know?
• Nicolai’s contact details
– Email address
• Who he knows / might know
– His social network
– School, hobby groups, …
• What he likes
– His interests
• How he writes
And what can we do?
• Target Nicolai:
– “Hi, we met at Porsche club, ManAge spa…”
– “Your 2013 Mercedes GL550 service is due, …”
• Or, pretend to be Nicolai
– Target his contacts / colleagues
(firstname.lastname@helpag.com)
– We know his writing style
– Exploit their trust
How can we do it?
• Need to trick target to
“believe us”
• Let technology help us
• Abuse 33 year old protocol
– Domain squatting
– Fake email threads
– Fake CC
Domain Squatting
• Using “similar” domain for bad purposes
– Homoglyphs, repetition, transposition…
– Use DNSTwist
Original* helpag.com
...
Homoglyph heipag.com
Homoglyph he1pag.com
Homoglyph helpaq.com
...
Transposition heplag.com
...
Increase credibility
• Make your email as legit as possible
• Email footer?
– Annoy somebody till they email you back 
Fake Email Threads
• SMTP just sends text
to a program.
– “Email threads” have no
connection.
– Unless we have the entire
thread, digitally signed, we
can’t trust it at all
– Modern equivalent of
saying:
“Can I go dad? Mom said I
could go”
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• To, CC and BCC does
the same thing
(SMTP wise)
• SMTP sends the
message to every
recipient
Putting it all together
Fake email thread
Fake CC
Domain spoofing
Same writing style
Get access
• Invite user to visit URL
– New intranet portal, survey, …
– Capture domain credentials
• Through basic auth popup
(many think it’s the proxy)
• Through a webpage
– Make site seem as real as possible (logo, …)
– Show the domain name filled in
Get access: phishing site
Or, deliver malware
• Choose distribution method:
– Exe, pif, cmd, scr: probably blocked
– PDF, Office macro, .. : probably allowed
Lessons learned
• Awareness is key
• Minimize digital footprint
– The more people know about
you, the more they can trick you.
• Use digital signatures
• Don’t trust anything sent to you.
Questions?
Thank you!
@ndrix
mhendrickx@owasp.org

Más contenido relacionado

Similar a Social Engineering Trickx - Owasp Doha 2015

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling Paul Slack
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursMattan Griffel
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter4Good.org
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersKurt Shaver
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyNelly Yusupova
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...Susanna Frazier
 

Similar a Social Engineering Trickx - Owasp Doha 2015 (20)

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Linked in this misunderstood goldmine
Linked in this misunderstood goldmineLinked in this misunderstood goldmine
Linked in this misunderstood goldmine
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 Hours
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More Customers
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more Effectively
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Turn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar ClassTurn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar Class
 
Linked In 0612
Linked In 0612Linked In 0612
Linked In 0612
 
The future of content
The future of contentThe future of content
The future of content
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Social Engineering Trickx - Owasp Doha 2015

  • 1. Social Engineering Trickx Michael Hendrickx Doha, Qatar. 23 Nov 2015
  • 2. $ whoami • Michael Hendrickx – Security Analyst in HelpAG – Working in infosec for past decade – mhendrickx@owasp.org – Belgian
  • 3. Social Engineering • You have a firewall, good for you. – Let’s target the users, not systems • Human beings are helpful by nature • Defined as: “Any act that influences a person to take an action that may or may not be in their best interest” Find people Find Info Get access
  • 4. Finding people • 2 Ways of finding people: – Phishing (casting a net) • Quantity over quality • Very noisy – Spear phishing (targeted) • Quality over quantity • Takes more time, more effort
  • 5. Finding people: phishing • People haven’t changed much
  • 6. Finding people: phishing • People haven’t changed much
  • 7. Finding people: phishing • People haven’t changed much
  • 8. Finding people: phishing • People haven’t changed much
  • 9. Finding people: phishing • People haven’t changed much
  • 10. Finding people: phishing • People haven’t changed much
  • 11. Finding people: phishing • People haven’t changed much Recent “Rombertik” malware: - State of the art malware (evil though) - 97% of code never called - sandbox confusion - browser snooping - MBR destruction upon debug-detection - Lame Ineffective distribution
  • 12. Finding people: phishing • Phishing not always best option – Very noisy – ISP / Hosting company may block you – Too many recipients • Somebody is bound to report it Spear phishing is a better option
  • 13. Finding people: spear phishing • Email from somebody who “knows you” – You probably know them too • Somebody who took time to research you • Interested in you – Rather, what you know – Who you know – What you have access to.
  • 14. Finding people • Target a domain, find its users: – Maltego, theHarvester, metasploit, recon-ng Emails are probably: firstname.lastname@helpag.com
  • 15. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … https://ae.linkedin.com/in/nsolling
  • 16. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … Let’s dig just a bit further…. https://ae.linkedin.com/in/nsolling
  • 17. Study the target: Nicolai Solling
  • 18. Study the target: Nicolai Solling We know Nicolai’s writing style
  • 19. More target studying • Examine digital footprint
  • 20. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Interests: • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL550 • Trivial Pursuit
  • 21. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL55 • Trivial Pursuit
  • 22. So far, what do we know? • Nicolai’s contact details – Email address • Who he knows / might know – His social network – School, hobby groups, … • What he likes – His interests • How he writes
  • 23. And what can we do? • Target Nicolai: – “Hi, we met at Porsche club, ManAge spa…” – “Your 2013 Mercedes GL550 service is due, …” • Or, pretend to be Nicolai – Target his contacts / colleagues (firstname.lastname@helpag.com) – We know his writing style – Exploit their trust
  • 24. How can we do it? • Need to trick target to “believe us” • Let technology help us • Abuse 33 year old protocol – Domain squatting – Fake email threads – Fake CC
  • 25. Domain Squatting • Using “similar” domain for bad purposes – Homoglyphs, repetition, transposition… – Use DNSTwist Original* helpag.com ... Homoglyph heipag.com Homoglyph he1pag.com Homoglyph helpaq.com ... Transposition heplag.com ...
  • 26. Increase credibility • Make your email as legit as possible • Email footer? – Annoy somebody till they email you back 
  • 27. Fake Email Threads • SMTP just sends text to a program. – “Email threads” have no connection. – Unless we have the entire thread, digitally signed, we can’t trust it at all – Modern equivalent of saying: “Can I go dad? Mom said I could go”
  • 28. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 29. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 30. Fake CC • To, CC and BCC does the same thing (SMTP wise) • SMTP sends the message to every recipient
  • 31. Putting it all together Fake email thread Fake CC Domain spoofing Same writing style
  • 32. Get access • Invite user to visit URL – New intranet portal, survey, … – Capture domain credentials • Through basic auth popup (many think it’s the proxy) • Through a webpage – Make site seem as real as possible (logo, …) – Show the domain name filled in
  • 34. Or, deliver malware • Choose distribution method: – Exe, pif, cmd, scr: probably blocked – PDF, Office macro, .. : probably allowed
  • 35. Lessons learned • Awareness is key • Minimize digital footprint – The more people know about you, the more they can trick you. • Use digital signatures • Don’t trust anything sent to you.