SlideShare a Scribd company logo
1 of 36
Social Engineering Trickx
Michael Hendrickx
Doha, Qatar. 23 Nov 2015
$ whoami
• Michael Hendrickx
– Security Analyst in HelpAG
– Working in infosec for past decade
– mhendrickx@owasp.org
– Belgian
Social Engineering
• You have a firewall, good for you.
– Let’s target the users, not systems
• Human beings are helpful by nature
• Defined as:
“Any act that influences a person to take an action
that may or may not be in their best interest”
Find people Find Info Get access
Finding people
• 2 Ways of finding people:
– Phishing (casting a net)
• Quantity over quality
• Very noisy
– Spear phishing (targeted)
• Quality over quantity
• Takes more time, more effort
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Finding people: phishing
• People haven’t changed much
Recent “Rombertik” malware:
- State of the art malware (evil though)
- 97% of code never called
- sandbox confusion
- browser snooping
- MBR destruction upon debug-detection
- Lame Ineffective distribution
Finding people: phishing
• Phishing not always best option
– Very noisy
– ISP / Hosting company may block you
– Too many recipients
• Somebody is bound to report it
Spear phishing is a better option
Finding people: spear phishing
• Email from somebody
who “knows you”
– You probably know them too
• Somebody who took
time to research you
• Interested in you
– Rather, what you know
– Who you know
– What you have access to.
Finding people
• Target a domain, find its users:
– Maltego, theHarvester, metasploit, recon-ng
Emails are probably:
firstname.lastname@helpag.com
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
https://ae.linkedin.com/in/nsolling
Finding people
• Emails are firstname.lastname@helpag.com
Let’s look for more names:
stephan.berner@helpag.com?
angelika.plate@helpag.com?
alexandra.pisetskaya@helpag.com?
nadia.zamouri@helpag.com?
aashish.sharma@helpag.com?
prashant.jani@helpag.com?
…
Let’s dig just a bit further….
https://ae.linkedin.com/in/nsolling
Study the target: Nicolai Solling
Study the target: Nicolai Solling
We know Nicolai’s writing style
More target studying
• Examine digital footprint
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Interests:
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL550
• Trivial Pursuit
More target studying
• Examine digital footprint
Nicolai’s Digital footprint:
• Full name
• Address
• Porsche 911
• PADI Diver
• Line6 Guitar pod
• Merc GL55
• Trivial Pursuit
So far, what do we know?
• Nicolai’s contact details
– Email address
• Who he knows / might know
– His social network
– School, hobby groups, …
• What he likes
– His interests
• How he writes
And what can we do?
• Target Nicolai:
– “Hi, we met at Porsche club, ManAge spa…”
– “Your 2013 Mercedes GL550 service is due, …”
• Or, pretend to be Nicolai
– Target his contacts / colleagues
(firstname.lastname@helpag.com)
– We know his writing style
– Exploit their trust
How can we do it?
• Need to trick target to
“believe us”
• Let technology help us
• Abuse 33 year old protocol
– Domain squatting
– Fake email threads
– Fake CC
Domain Squatting
• Using “similar” domain for bad purposes
– Homoglyphs, repetition, transposition…
– Use DNSTwist
Original* helpag.com
...
Homoglyph heipag.com
Homoglyph he1pag.com
Homoglyph helpaq.com
...
Transposition heplag.com
...
Increase credibility
• Make your email as legit as possible
• Email footer?
– Annoy somebody till they email you back 
Fake Email Threads
• SMTP just sends text
to a program.
– “Email threads” have no
connection.
– Unless we have the entire
thread, digitally signed, we
can’t trust it at all
– Modern equivalent of
saying:
“Can I go dad? Mom said I
could go”
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• CC doesn’t really exist
• It’s just a MIME
header
HELO blah
MAIL FROM: admin@flurk.org
RCPT TO: michael.hendrickx@helpag.com
DATA
From: Michael Hendrickx <michael@flurk.org>
Content-Type: text/plain;
Subject: Very important email
Cc: khaled hawasli <khaled.hawasli@helpag.com>,
barack.obama@whitehouse.gov
To: michael.hendrickx@helpag.com
Hey guys,
As per our conversation, please install the
security update located at
http://evil.com/patch.exe
Well, in fact, this is an email that Khaled and
Obama will never get - but you can never find
that out!
Thank you,
Security Admin
This is for the
SMTP server
This is for the
email client
Fake CC
• To, CC and BCC does
the same thing
(SMTP wise)
• SMTP sends the
message to every
recipient
Putting it all together
Fake email thread
Fake CC
Domain spoofing
Same writing style
Get access
• Invite user to visit URL
– New intranet portal, survey, …
– Capture domain credentials
• Through basic auth popup
(many think it’s the proxy)
• Through a webpage
– Make site seem as real as possible (logo, …)
– Show the domain name filled in
Get access: phishing site
Or, deliver malware
• Choose distribution method:
– Exe, pif, cmd, scr: probably blocked
– PDF, Office macro, .. : probably allowed
Lessons learned
• Awareness is key
• Minimize digital footprint
– The more people know about
you, the more they can trick you.
• Use digital signatures
• Don’t trust anything sent to you.
Questions?
Thank you!
@ndrix
mhendrickx@owasp.org

More Related Content

Similar to Social Engineering Trickx - Owasp Doha 2015

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling Paul Slack
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursMattan Griffel
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter4Good.org
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersKurt Shaver
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyNelly Yusupova
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...Susanna Frazier
 

Similar to Social Engineering Trickx - Owasp Doha 2015 (20)

Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker SideCybercrime and the Developer: How to Start Defending Against the Darker Side
Cybercrime and the Developer: How to Start Defending Against the Darker Side
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
LinkedIn & Social Selling
LinkedIn & Social Selling  LinkedIn & Social Selling
LinkedIn & Social Selling
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Linked in this misunderstood goldmine
Linked in this misunderstood goldmineLinked in this misunderstood goldmine
Linked in this misunderstood goldmine
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Discretion in APT
Discretion in APTDiscretion in APT
Discretion in APT
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
How We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 HoursHow We (Unexpectedly) Got 60K Users in 60 Hours
How We (Unexpectedly) Got 60K Users in 60 Hours
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Email Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly NewsletterEmail Marketing 101 – Beyond the Monthly Newsletter
Email Marketing 101 – Beyond the Monthly Newsletter
 
Marketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More CustomersMarketing Content + Sales Relationships = More Customers
Marketing Content + Sales Relationships = More Customers
 
Tips for Using Twitter more Effectively
Tips for Using Twitter more EffectivelyTips for Using Twitter more Effectively
Tips for Using Twitter more Effectively
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Turn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar ClassTurn Your Tweet Into A Roar Class
Turn Your Tweet Into A Roar Class
 
Linked In 0612
Linked In 0612Linked In 0612
Linked In 0612
 
The future of content
The future of contentThe future of content
The future of content
 
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
1pager: How to Find Contact Information - Phone Numbers & Email Addresses (So...
 

Recently uploaded

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 

Recently uploaded (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 

Social Engineering Trickx - Owasp Doha 2015

  • 1. Social Engineering Trickx Michael Hendrickx Doha, Qatar. 23 Nov 2015
  • 2. $ whoami • Michael Hendrickx – Security Analyst in HelpAG – Working in infosec for past decade – mhendrickx@owasp.org – Belgian
  • 3. Social Engineering • You have a firewall, good for you. – Let’s target the users, not systems • Human beings are helpful by nature • Defined as: “Any act that influences a person to take an action that may or may not be in their best interest” Find people Find Info Get access
  • 4. Finding people • 2 Ways of finding people: – Phishing (casting a net) • Quantity over quality • Very noisy – Spear phishing (targeted) • Quality over quantity • Takes more time, more effort
  • 5. Finding people: phishing • People haven’t changed much
  • 6. Finding people: phishing • People haven’t changed much
  • 7. Finding people: phishing • People haven’t changed much
  • 8. Finding people: phishing • People haven’t changed much
  • 9. Finding people: phishing • People haven’t changed much
  • 10. Finding people: phishing • People haven’t changed much
  • 11. Finding people: phishing • People haven’t changed much Recent “Rombertik” malware: - State of the art malware (evil though) - 97% of code never called - sandbox confusion - browser snooping - MBR destruction upon debug-detection - Lame Ineffective distribution
  • 12. Finding people: phishing • Phishing not always best option – Very noisy – ISP / Hosting company may block you – Too many recipients • Somebody is bound to report it Spear phishing is a better option
  • 13. Finding people: spear phishing • Email from somebody who “knows you” – You probably know them too • Somebody who took time to research you • Interested in you – Rather, what you know – Who you know – What you have access to.
  • 14. Finding people • Target a domain, find its users: – Maltego, theHarvester, metasploit, recon-ng Emails are probably: firstname.lastname@helpag.com
  • 15. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … https://ae.linkedin.com/in/nsolling
  • 16. Finding people • Emails are firstname.lastname@helpag.com Let’s look for more names: stephan.berner@helpag.com? angelika.plate@helpag.com? alexandra.pisetskaya@helpag.com? nadia.zamouri@helpag.com? aashish.sharma@helpag.com? prashant.jani@helpag.com? … Let’s dig just a bit further…. https://ae.linkedin.com/in/nsolling
  • 17. Study the target: Nicolai Solling
  • 18. Study the target: Nicolai Solling We know Nicolai’s writing style
  • 19. More target studying • Examine digital footprint
  • 20. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Interests: • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL550 • Trivial Pursuit
  • 21. More target studying • Examine digital footprint Nicolai’s Digital footprint: • Full name • Address • Porsche 911 • PADI Diver • Line6 Guitar pod • Merc GL55 • Trivial Pursuit
  • 22. So far, what do we know? • Nicolai’s contact details – Email address • Who he knows / might know – His social network – School, hobby groups, … • What he likes – His interests • How he writes
  • 23. And what can we do? • Target Nicolai: – “Hi, we met at Porsche club, ManAge spa…” – “Your 2013 Mercedes GL550 service is due, …” • Or, pretend to be Nicolai – Target his contacts / colleagues (firstname.lastname@helpag.com) – We know his writing style – Exploit their trust
  • 24. How can we do it? • Need to trick target to “believe us” • Let technology help us • Abuse 33 year old protocol – Domain squatting – Fake email threads – Fake CC
  • 25. Domain Squatting • Using “similar” domain for bad purposes – Homoglyphs, repetition, transposition… – Use DNSTwist Original* helpag.com ... Homoglyph heipag.com Homoglyph he1pag.com Homoglyph helpaq.com ... Transposition heplag.com ...
  • 26. Increase credibility • Make your email as legit as possible • Email footer? – Annoy somebody till they email you back 
  • 27. Fake Email Threads • SMTP just sends text to a program. – “Email threads” have no connection. – Unless we have the entire thread, digitally signed, we can’t trust it at all – Modern equivalent of saying: “Can I go dad? Mom said I could go”
  • 28. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 29. Fake CC • CC doesn’t really exist • It’s just a MIME header HELO blah MAIL FROM: admin@flurk.org RCPT TO: michael.hendrickx@helpag.com DATA From: Michael Hendrickx <michael@flurk.org> Content-Type: text/plain; Subject: Very important email Cc: khaled hawasli <khaled.hawasli@helpag.com>, barack.obama@whitehouse.gov To: michael.hendrickx@helpag.com Hey guys, As per our conversation, please install the security update located at http://evil.com/patch.exe Well, in fact, this is an email that Khaled and Obama will never get - but you can never find that out! Thank you, Security Admin This is for the SMTP server This is for the email client
  • 30. Fake CC • To, CC and BCC does the same thing (SMTP wise) • SMTP sends the message to every recipient
  • 31. Putting it all together Fake email thread Fake CC Domain spoofing Same writing style
  • 32. Get access • Invite user to visit URL – New intranet portal, survey, … – Capture domain credentials • Through basic auth popup (many think it’s the proxy) • Through a webpage – Make site seem as real as possible (logo, …) – Show the domain name filled in
  • 34. Or, deliver malware • Choose distribution method: – Exe, pif, cmd, scr: probably blocked – PDF, Office macro, .. : probably allowed
  • 35. Lessons learned • Awareness is key • Minimize digital footprint – The more people know about you, the more they can trick you. • Use digital signatures • Don’t trust anything sent to you.