SlideShare a Scribd company logo
1 of 27
Hacker tool talk: SET
The Social Engineering Toolkit
   “Or how I learned to put tape over my webcam”

                 Chris Hammond-Thrasher
        chris.hammond-thrasher <at> ca.fujitsu.com
               Fujitsu Edmonton Security Lab
                       December 2011




                   Fujitsu Edmonton Security Lab     1
Agenda
•   Why are we here?
•   What is social engineering?
•   Setting up a security lab
•   About SET and its dependencies
•   Installing SET
•   SET demo
•   What’s next?

                 Fujitsu Edmonton Security Lab   2
Why are we here?




    Fujitsu Edmonton Security Lab   3
Ethics and motives
“Every single scam in human history has
worked for one key reason; the victim did
not recognize it as a scam.”
- R. Paul Wilson




                Fujitsu Edmonton Security Lab   4
What is social engineering?




         Fujitsu Edmonton Security Lab   5
Social science definition
• “Social engineering is a discipline in political science that
  refers to efforts to influence popular attitudes and social
  behaviors on a large scale, whether by governments or
  private groups… For various reasons, the term has been
  imbued with negative connotations. However, virtually all law
  and governance has the effect of changing behavior and can
  be considered "social engineering" to some extent.
  Prohibitions on murder, rape, suicide and littering are all
  policies aimed at discouraging undesirable behaviors. In
  British and Canadian jurisprudence, changing public attitudes
  about a behaviour is accepted as one of the key functions of
  laws prohibiting it. Governments also influence behavior more
  subtly through incentives and disincentives built into economic
  policy and tax policy, for instance, and have done so for
  centuries.”
  - Wikipedia (“social engineering (political science)” 26 October 2011)


                                Fujitsu Edmonton Security Lab              6
Information security definition
• “We define it as the act of manipulating a
  person to accomplish goals that may or
  may not be in the “target’s” best interest.
  This may include obtaining information,
  gaining access, or getting the target to
  take certain action.”
 - Chris Hadnagy (social-engineer.org)




                        Fujitsu Edmonton Security Lab   7
Setting up a security lab




        Fujitsu Edmonton Security Lab   8
Security lab reqs
• It’s actually pretty easy to setup
   – A network
      • Isolated from other networks
      • Any wired hub, switch, or router and cable; wireless is an option;
        or the virtual network created by virtualization tools is also OK.
      • Recommendation: Keep it simple and go wired if you can
   – Attack/dev box
      • Linux or Unix is generally the best option, OS X is getting better
        support, or Windows as the least desirable OS.
      • Recommendation: OS: Backtrack Linux, Packet tool: Wireshark
   – Target box
      • Recommendation: OS: Windows (any) and VMWare (or your
        favorite virtualization tool)
   – Logging/monitoring box (Optional)
      • Recommendation: OS: Any, Packet tool: Wireshark

                          Fujitsu Edmonton Security Lab                      9
Caution
• This is not a game. Attacking machines
  with the tools in this presentation without
  permission is not only unethical, but is a
  criminal offense in many jurisdictions.




                 Fujitsu Edmonton Security Lab   10
About SET




 Fujitsu Edmonton Security Lab   11
History
• The Social Engineering Toolkit (SET)
  – An open source project lead by Dave Kennedy, Chief
    Information Security Officer of a Fortune 1000
    company
  – Leverages the Metasploit Framework, FastTrack
    (another Dave Kennedy lead project), and other open
    source tools
  – Originally released in 2009 to coincide with the launch
    of social-engineer.org
  – “The Social-Engineering Toolkit (SET) is a python-
    driven suite of custom tools which solely focuses on
    attacking the human element of pentesting. It’s main
    purpose is to augment and simulate social-
    engineering attacks and allow the tester to effectively
    test how a targeted attack may succeed.”
    - from the secmaniac.org download page
                     Fujitsu Edmonton Security Lab       12
Features
• SET implements a variety of targeted
  attacks that fall into three main categories
  1. Create malicious websites through site
     cloning or templates that launch Metasploit
     or Java applet attacks at clients
  2. Create and send phishing and
     spearphishing emails
  3. Create malicious files – PDFs, MS Office
     docs, EXEs, etc.
• Free as in speech and beer
                  Fujitsu Edmonton Security Lab    13
Legit uses of SET
• Penetration testing – with or without social
  engineering in scope
  – “Can an attacker still get shell when my firewall, IDS,
    and antivirus are awesome?”
  – “Can an attacker get shell on privately addressed
    machines behind my NATed firewall?”
  – “How can I check if my staff can be fooled into doing
    something stupid and placing the entire enterprise
    and our clients at risk?”



                     Fujitsu Edmonton Security Lab            14
h4X0r$
• Provide the technical components of social
  engineering attacks
  – “I think I can trick the CEO/CFO/Financial
    Analyst/DBA into clicking on a link or opening a file
    attachment that I email to her, but how do I create an
    evil site or file for her to hit?”
  – “If I am going to drop USB thumb drives in the target’s
    parking lot, what evil file should I put on it?”
  – “How can I encode my evil payload to evade
    antivirus?”

                     Fujitsu Edmonton Security Lab        15
Installing SET




  Fujitsu Edmonton Security Lab   16
Choices
• Easiest: Get latest Backtrack (BT5R1)
 http://www.backtrack-linux.org/downloads/

• Linux power user: Use svn to install the
  latest build (no compile required – it’s
  Python)
 svn co http://svn.secmaniac.com/social_engineering_toolkit set/

 and

 firefox http://metasploit.com/download/ &

 (grab the latest stable Metasploit release and follow installation instructions)
                            Fujitsu Edmonton Security Lab                      17
Configuration
• Regardless of your installation method,
  open and edit the set_config file in the
  config directory of your SET installation (in
  Backtrack this is
  pentest/exploits/SET/config/set_config)
• The configuration file is well commented –
  don’t be afraid


                 Fujitsu Edmonton Security Lab   18
SET demo




Fujitsu Edmonton Security Lab   19
SET demo
•   Starting it up
•   Updating SET and Metasploit
•   Menu tour
•   The Java applet attack vector
•   A quick look at post exploitation (or why I
    have tape over my webcam lens)



                   Fujitsu Edmonton Security Lab   20
1. HTTP GET request on port 80 (initiated by the user)



                          2. HTTP RESPONSES with HTML and Java payload

                                                                                                     3. Anti-
Attacker’s Web Server




                                                                                                     virus?




                                                                                                                 Victim’s Browser
                                                                                 Victim’s Firewall
                                                                                                     4. Run
                                                                                                     unsigned
                                                                                                       Java
                               4. Request TCP connection on port 443                                 applet?



                             5. Command and control session established



                                                 Fujitsu Edmonton Security Lab                                  21
What’s next




 Fujitsu Edmonton Security Lab   22
Learn more
• Read social-engineer.org and listen to
  their podcast
• Read Chris Hadnagy’s Social Engineering:
  The Art of Human Hacking




               Fujitsu Edmonton Security Lab   23
Act locally
• At work
  – Show your colleagues how clicking on an
    innocent URL and then ignoring the Java
    applet warning can lead to their laptop turning
    into a spy-cam
  – Show your colleagues how scam emails can
    lead to your computer being compromised if
    you open attachments or follow links – even if
    you don’t reply to their pleas for financial help

                   Fujitsu Edmonton Security Lab    24
Act locally
• At home
  – My family used to ignore my warnings about
    strange email attachments and URLs. Then
    one day I fired up the SET Java applet attack
    and emailed my daughter a URL with a
    message to check out “something cool”. Two
    minutes later I called her over to my machine
    and showed her a picture of herself that I had
    captured through her laptop’s webcam. Not
    only will she never follow a strange link again
    but she has covered her webcam lens with
    masking tape.
                  Fujitsu Edmonton Security Lab   25
Thank you!


                  Want more presentations like this?
Is there a particular tool or hack that you would like to see demoed?

              Fujitsu Edmonton Security Lab
                Chris Hammond-Thrasher
  Email: chris.hammond-thrasher <at> ca.fujitsu.com
                   Twitter: @thrashor

                        Yetunde Oladunni
               Email: yetundefashoro@gmail.com

                         Fujitsu Edmonton Security Lab                  26
Fujitsu Edmonton Security Lab   27

More Related Content

What's hot

Metasploit
MetasploitMetasploit
Metasploithenelpj
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
N map presentation
N map presentationN map presentation
N map presentationulirraptor
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection MechanismMona Rajput
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesSyedAmoz
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringSam Bowne
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testingMohit Belwal
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testingImaginea
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric VanderburgEric Vanderburg
 

What's hot (20)

Metasploit
MetasploitMetasploit
Metasploit
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
N map presentation
N map presentationN map presentation
N map presentation
 
Security Principles and Protection Mechanism
Security Principles and Protection MechanismSecurity Principles and Protection Mechanism
Security Principles and Protection Mechanism
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
NMap
NMapNMap
NMap
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Software security
Software securitySoftware security
Software security
 
OSINT with Practical: Real Life Examples
OSINT with Practical: Real Life ExamplesOSINT with Practical: Real Life Examples
OSINT with Practical: Real Life Examples
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Networking and penetration testing
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 

Viewers also liked

Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyMike Murray
 
Introduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceIntroduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceTOP Technology Talks (TOP b.v.)
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
Social engineering-Sandy Suhling
Social engineering-Sandy SuhlingSocial engineering-Sandy Suhling
Social engineering-Sandy Suhlingsuhlingse
 
Antisocial powerpoint
Antisocial powerpointAntisocial powerpoint
Antisocial powerpointMilen Ramos
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 

Viewers also liked (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Hacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through TechnologyHacker Halted 2009 - Owning People through Technology
Hacker Halted 2009 - Owning People through Technology
 
Introduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produceIntroduction AMAP Technology - extending shelf life of fresh cut produce
Introduction AMAP Technology - extending shelf life of fresh cut produce
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
Netcat
NetcatNetcat
Netcat
 
Social engineering-Sandy Suhling
Social engineering-Sandy SuhlingSocial engineering-Sandy Suhling
Social engineering-Sandy Suhling
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Antisocial powerpoint
Antisocial powerpointAntisocial powerpoint
Antisocial powerpoint
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 

Similar to Hacker tooltalk: Social Engineering Toolkit (SET)

Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorismSensePost
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GSavvius, Inc
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss developmentbezpiecznik
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudInternap
 
Scalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureScalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureNicholas Zakas
 
32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canadaTech Online
 
33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canadaTech Online
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...Itris Automation Square
 
Web 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business ModelsWeb 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business Modelscghollins
 
Vineet Choudhry Portfolio
Vineet Choudhry PortfolioVineet Choudhry Portfolio
Vineet Choudhry PortfolioRakesh Ranjan
 
31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canadaTech Online
 
Satellite With Alt Dvb
Satellite With Alt DvbSatellite With Alt Dvb
Satellite With Alt DvbSais Abdelkrim
 
Mobile Cloud Architectures
Mobile Cloud ArchitecturesMobile Cloud Architectures
Mobile Cloud ArchitecturesDavid Coallier
 
A Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesA Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesChris McNulty
 
Vc caringbah hs
Vc caringbah hsVc caringbah hs
Vc caringbah hscarena
 

Similar to Hacker tooltalk: Social Engineering Toolkit (SET) (20)

Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Network Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10GNetwork Forensics - Your Only Choice at 10G
Network Forensics - Your Only Choice at 10G
 
1112 agile approach to pci dss development
1112 agile approach to pci dss development1112 agile approach to pci dss development
1112 agile approach to pci dss development
 
Hacking Rapidshare
Hacking RapidshareHacking Rapidshare
Hacking Rapidshare
 
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the CloudWebinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
 
Scalable JavaScript Application Architecture
Scalable JavaScript Application ArchitectureScalable JavaScript Application Architecture
Scalable JavaScript Application Architecture
 
Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11Ubiquisys at Femtocells Americas 11
Ubiquisys at Femtocells Americas 11
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada32 norton antivirus customer service in usa canada
32 norton antivirus customer service in usa canada
 
FYP Presentation
FYP PresentationFYP Presentation
FYP Presentation
 
33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada33 norton antivirus customer service in usa canada
33 norton antivirus customer service in usa canada
 
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
[EN] Club Automation presentation "Quality Model for Industrial Automation", ...
 
Web 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business ModelsWeb 3.0 - Concepts, Technologies, and Evolving Business Models
Web 3.0 - Concepts, Technologies, and Evolving Business Models
 
Alt Dvb
Alt DvbAlt Dvb
Alt Dvb
 
Vineet Choudhry Portfolio
Vineet Choudhry PortfolioVineet Choudhry Portfolio
Vineet Choudhry Portfolio
 
31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada31 norton antivirus customer service in usa canada
31 norton antivirus customer service in usa canada
 
Satellite With Alt Dvb
Satellite With Alt DvbSatellite With Alt Dvb
Satellite With Alt Dvb
 
Mobile Cloud Architectures
Mobile Cloud ArchitecturesMobile Cloud Architectures
Mobile Cloud Architectures
 
A Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption StrategiesA Decade of SharePoint Adoption Strategies
A Decade of SharePoint Adoption Strategies
 
Vc caringbah hs
Vc caringbah hsVc caringbah hs
Vc caringbah hs
 

More from Chris Hammond-Thrasher (13)

Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Six health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried outSix health privacy experiments that should *NEVER* be caried out
Six health privacy experiments that should *NEVER* be caried out
 
Spiritualists, magicians and security vendors
Spiritualists, magicians and security vendorsSpiritualists, magicians and security vendors
Spiritualists, magicians and security vendors
 
hackers vs suits
hackers vs suitshackers vs suits
hackers vs suits
 
Introduction to Green IT
Introduction to Green ITIntroduction to Green IT
Introduction to Green IT
 
Hacker tool talk: kismet
Hacker tool talk: kismetHacker tool talk: kismet
Hacker tool talk: kismet
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
Hacker tool talk: kismet
Hacker tool talk:  kismetHacker tool talk:  kismet
Hacker tool talk: kismet
 
Open Source Library Software
Open Source Library SoftwareOpen Source Library Software
Open Source Library Software
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
 
Popular GIS: a webliography
Popular GIS: a webliographyPopular GIS: a webliography
Popular GIS: a webliography
 
Popular GIS
Popular GISPopular GIS
Popular GIS
 
How hackers do it
How hackers do itHow hackers do it
How hackers do it
 

Recently uploaded

Hire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectHire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectCyanic lab
 
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...Amil Baba Mangal Maseeh
 
Sabbath Cooking seventh-day sabbath.docx
Sabbath Cooking seventh-day sabbath.docxSabbath Cooking seventh-day sabbath.docx
Sabbath Cooking seventh-day sabbath.docxdarrenguzago001
 
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxJude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxStephen Palm
 
Genesis 1:7 || Meditate the Scripture daily verse by verse
Genesis 1:7  ||  Meditate the Scripture daily verse by verseGenesis 1:7  ||  Meditate the Scripture daily verse by verse
Genesis 1:7 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...baharayali
 
St John's Church Parish Diary for May 2024
St John's Church Parish Diary for May 2024St John's Church Parish Diary for May 2024
St John's Church Parish Diary for May 2024Chris Lyne
 
Genesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitGenesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitmaricelcanoynuay
 
MEIDUNIDADE COM JESUS PALESTRA ESPIRITA1.pptx
MEIDUNIDADE COM JESUS  PALESTRA ESPIRITA1.pptxMEIDUNIDADE COM JESUS  PALESTRA ESPIRITA1.pptx
MEIDUNIDADE COM JESUS PALESTRA ESPIRITA1.pptxMneasEntidades
 
Genesis 1:10 || Meditate the Scripture daily verse by verse
Genesis 1:10  ||  Meditate the Scripture daily verse by verseGenesis 1:10  ||  Meditate the Scripture daily verse by verse
Genesis 1:10 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...baharayali
 
Authentic Black magic, Kala ilam expert in UAE and Kala ilam specialist in S...
Authentic Black magic, Kala ilam expert in UAE  and Kala ilam specialist in S...Authentic Black magic, Kala ilam expert in UAE  and Kala ilam specialist in S...
Authentic Black magic, Kala ilam expert in UAE and Kala ilam specialist in S...baharayali
 
Legends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxxLegends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxxssuser83613b
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...Amil Baba Naveed Bangali
 
The Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxThe Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxFred Gosnell
 
Flores de Mayo-history and origin we need to understand
Flores de Mayo-history and origin we need to understandFlores de Mayo-history and origin we need to understand
Flores de Mayo-history and origin we need to understandvillamilcecil909
 

Recently uploaded (20)

Hire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your ProjectHire Best Next Js Developer For Your Project
Hire Best Next Js Developer For Your Project
 
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...
+92343-7800299 No.1 Amil baba in Pakistan amil baba in Lahore amil baba in Ka...
 
Sabbath Cooking seventh-day sabbath.docx
Sabbath Cooking seventh-day sabbath.docxSabbath Cooking seventh-day sabbath.docx
Sabbath Cooking seventh-day sabbath.docx
 
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptxJude: The Acts of the Apostates (Jude vv.1-4).pptx
Jude: The Acts of the Apostates (Jude vv.1-4).pptx
 
Genesis 1:7 || Meditate the Scripture daily verse by verse
Genesis 1:7  ||  Meditate the Scripture daily verse by verseGenesis 1:7  ||  Meditate the Scripture daily verse by verse
Genesis 1:7 || Meditate the Scripture daily verse by verse
 
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
Top Kala Jadu, Bangali Amil baba in Lahore and Kala jadu specialist in Lahore...
 
St John's Church Parish Diary for May 2024
St John's Church Parish Diary for May 2024St John's Church Parish Diary for May 2024
St John's Church Parish Diary for May 2024
 
Genesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bitGenesis 1:5 - Meditate the Scripture Daily bit by bit
Genesis 1:5 - Meditate the Scripture Daily bit by bit
 
MEIDUNIDADE COM JESUS PALESTRA ESPIRITA1.pptx
MEIDUNIDADE COM JESUS  PALESTRA ESPIRITA1.pptxMEIDUNIDADE COM JESUS  PALESTRA ESPIRITA1.pptx
MEIDUNIDADE COM JESUS PALESTRA ESPIRITA1.pptx
 
Genesis 1:10 || Meditate the Scripture daily verse by verse
Genesis 1:10  ||  Meditate the Scripture daily verse by verseGenesis 1:10  ||  Meditate the Scripture daily verse by verse
Genesis 1:10 || Meditate the Scripture daily verse by verse
 
Zulu - The Epistle of Ignatius to Polycarp.pdf
Zulu - The Epistle of Ignatius to Polycarp.pdfZulu - The Epistle of Ignatius to Polycarp.pdf
Zulu - The Epistle of Ignatius to Polycarp.pdf
 
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
Popular Kala Jadu, Black magic specialist in Sialkot and Kala ilam specialist...
 
Authentic Black magic, Kala ilam expert in UAE and Kala ilam specialist in S...
Authentic Black magic, Kala ilam expert in UAE  and Kala ilam specialist in S...Authentic Black magic, Kala ilam expert in UAE  and Kala ilam specialist in S...
Authentic Black magic, Kala ilam expert in UAE and Kala ilam specialist in S...
 
St. Louise de Marillac and Galley Prisoners
St. Louise de Marillac and Galley PrisonersSt. Louise de Marillac and Galley Prisoners
St. Louise de Marillac and Galley Prisoners
 
Legends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxxLegends of the Light v2.pdf xxxxxxxxxxxxx
Legends of the Light v2.pdf xxxxxxxxxxxxx
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
St. Louise de Marillac and Care of the Sick Poor
St. Louise de Marillac and Care of the Sick PoorSt. Louise de Marillac and Care of the Sick Poor
St. Louise de Marillac and Care of the Sick Poor
 
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...
Verified Amil baba in Pakistan Amil baba in Islamabad Famous Amil baba in Ger...
 
The Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docxThe Revelation Chapter 4 Working Copy.docx
The Revelation Chapter 4 Working Copy.docx
 
Flores de Mayo-history and origin we need to understand
Flores de Mayo-history and origin we need to understandFlores de Mayo-history and origin we need to understand
Flores de Mayo-history and origin we need to understand
 

Hacker tooltalk: Social Engineering Toolkit (SET)

  • 1. Hacker tool talk: SET The Social Engineering Toolkit “Or how I learned to put tape over my webcam” Chris Hammond-Thrasher chris.hammond-thrasher <at> ca.fujitsu.com Fujitsu Edmonton Security Lab December 2011 Fujitsu Edmonton Security Lab 1
  • 2. Agenda • Why are we here? • What is social engineering? • Setting up a security lab • About SET and its dependencies • Installing SET • SET demo • What’s next? Fujitsu Edmonton Security Lab 2
  • 3. Why are we here? Fujitsu Edmonton Security Lab 3
  • 4. Ethics and motives “Every single scam in human history has worked for one key reason; the victim did not recognize it as a scam.” - R. Paul Wilson Fujitsu Edmonton Security Lab 4
  • 5. What is social engineering? Fujitsu Edmonton Security Lab 5
  • 6. Social science definition • “Social engineering is a discipline in political science that refers to efforts to influence popular attitudes and social behaviors on a large scale, whether by governments or private groups… For various reasons, the term has been imbued with negative connotations. However, virtually all law and governance has the effect of changing behavior and can be considered "social engineering" to some extent. Prohibitions on murder, rape, suicide and littering are all policies aimed at discouraging undesirable behaviors. In British and Canadian jurisprudence, changing public attitudes about a behaviour is accepted as one of the key functions of laws prohibiting it. Governments also influence behavior more subtly through incentives and disincentives built into economic policy and tax policy, for instance, and have done so for centuries.” - Wikipedia (“social engineering (political science)” 26 October 2011) Fujitsu Edmonton Security Lab 6
  • 7. Information security definition • “We define it as the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action.” - Chris Hadnagy (social-engineer.org) Fujitsu Edmonton Security Lab 7
  • 8. Setting up a security lab Fujitsu Edmonton Security Lab 8
  • 9. Security lab reqs • It’s actually pretty easy to setup – A network • Isolated from other networks • Any wired hub, switch, or router and cable; wireless is an option; or the virtual network created by virtualization tools is also OK. • Recommendation: Keep it simple and go wired if you can – Attack/dev box • Linux or Unix is generally the best option, OS X is getting better support, or Windows as the least desirable OS. • Recommendation: OS: Backtrack Linux, Packet tool: Wireshark – Target box • Recommendation: OS: Windows (any) and VMWare (or your favorite virtualization tool) – Logging/monitoring box (Optional) • Recommendation: OS: Any, Packet tool: Wireshark Fujitsu Edmonton Security Lab 9
  • 10. Caution • This is not a game. Attacking machines with the tools in this presentation without permission is not only unethical, but is a criminal offense in many jurisdictions. Fujitsu Edmonton Security Lab 10
  • 11. About SET Fujitsu Edmonton Security Lab 11
  • 12. History • The Social Engineering Toolkit (SET) – An open source project lead by Dave Kennedy, Chief Information Security Officer of a Fortune 1000 company – Leverages the Metasploit Framework, FastTrack (another Dave Kennedy lead project), and other open source tools – Originally released in 2009 to coincide with the launch of social-engineer.org – “The Social-Engineering Toolkit (SET) is a python- driven suite of custom tools which solely focuses on attacking the human element of pentesting. It’s main purpose is to augment and simulate social- engineering attacks and allow the tester to effectively test how a targeted attack may succeed.” - from the secmaniac.org download page Fujitsu Edmonton Security Lab 12
  • 13. Features • SET implements a variety of targeted attacks that fall into three main categories 1. Create malicious websites through site cloning or templates that launch Metasploit or Java applet attacks at clients 2. Create and send phishing and spearphishing emails 3. Create malicious files – PDFs, MS Office docs, EXEs, etc. • Free as in speech and beer Fujitsu Edmonton Security Lab 13
  • 14. Legit uses of SET • Penetration testing – with or without social engineering in scope – “Can an attacker still get shell when my firewall, IDS, and antivirus are awesome?” – “Can an attacker get shell on privately addressed machines behind my NATed firewall?” – “How can I check if my staff can be fooled into doing something stupid and placing the entire enterprise and our clients at risk?” Fujitsu Edmonton Security Lab 14
  • 15. h4X0r$ • Provide the technical components of social engineering attacks – “I think I can trick the CEO/CFO/Financial Analyst/DBA into clicking on a link or opening a file attachment that I email to her, but how do I create an evil site or file for her to hit?” – “If I am going to drop USB thumb drives in the target’s parking lot, what evil file should I put on it?” – “How can I encode my evil payload to evade antivirus?” Fujitsu Edmonton Security Lab 15
  • 16. Installing SET Fujitsu Edmonton Security Lab 16
  • 17. Choices • Easiest: Get latest Backtrack (BT5R1) http://www.backtrack-linux.org/downloads/ • Linux power user: Use svn to install the latest build (no compile required – it’s Python) svn co http://svn.secmaniac.com/social_engineering_toolkit set/ and firefox http://metasploit.com/download/ & (grab the latest stable Metasploit release and follow installation instructions) Fujitsu Edmonton Security Lab 17
  • 18. Configuration • Regardless of your installation method, open and edit the set_config file in the config directory of your SET installation (in Backtrack this is pentest/exploits/SET/config/set_config) • The configuration file is well commented – don’t be afraid Fujitsu Edmonton Security Lab 18
  • 19. SET demo Fujitsu Edmonton Security Lab 19
  • 20. SET demo • Starting it up • Updating SET and Metasploit • Menu tour • The Java applet attack vector • A quick look at post exploitation (or why I have tape over my webcam lens) Fujitsu Edmonton Security Lab 20
  • 21. 1. HTTP GET request on port 80 (initiated by the user) 2. HTTP RESPONSES with HTML and Java payload 3. Anti- Attacker’s Web Server virus? Victim’s Browser Victim’s Firewall 4. Run unsigned Java 4. Request TCP connection on port 443 applet? 5. Command and control session established Fujitsu Edmonton Security Lab 21
  • 22. What’s next Fujitsu Edmonton Security Lab 22
  • 23. Learn more • Read social-engineer.org and listen to their podcast • Read Chris Hadnagy’s Social Engineering: The Art of Human Hacking Fujitsu Edmonton Security Lab 23
  • 24. Act locally • At work – Show your colleagues how clicking on an innocent URL and then ignoring the Java applet warning can lead to their laptop turning into a spy-cam – Show your colleagues how scam emails can lead to your computer being compromised if you open attachments or follow links – even if you don’t reply to their pleas for financial help Fujitsu Edmonton Security Lab 24
  • 25. Act locally • At home – My family used to ignore my warnings about strange email attachments and URLs. Then one day I fired up the SET Java applet attack and emailed my daughter a URL with a message to check out “something cool”. Two minutes later I called her over to my machine and showed her a picture of herself that I had captured through her laptop’s webcam. Not only will she never follow a strange link again but she has covered her webcam lens with masking tape. Fujitsu Edmonton Security Lab 25
  • 26. Thank you! Want more presentations like this? Is there a particular tool or hack that you would like to see demoed? Fujitsu Edmonton Security Lab Chris Hammond-Thrasher Email: chris.hammond-thrasher <at> ca.fujitsu.com Twitter: @thrashor Yetunde Oladunni Email: yetundefashoro@gmail.com Fujitsu Edmonton Security Lab 26