Академический Документы
Профессиональный Документы
Культура Документы
by JL and Firasco
JL and Firasco
www.pizzaratings.com
IT-Security 1
Contents
JL and Firasco
www.pizzaratings.com
IT-Security 2
Definitions of Social
Engineering
JL and Firasco
www.pizzaratings.com
IT-Security 3
So now…
JL and Firasco
www.pizzaratings.com
IT-Security 4
Famous targets of Social
Engineering
1. Industrial Spying
2. Data Theft
3. Idenitiy Theft
4. Pizza4free
5. Etc.
JL and Firasco
www.pizzaratings.com
IT-Security 5
Types of Social Engineering
1. Phishing
2. Trojan horse
3. Quid pro Quo
4. Pretexting
JL and Firasco
www.pizzaratings.com
IT-Security 6
Types of Social Engineering:
Phishing
JL and Firasco
www.pizzaratings.com
IT-Security 7
Types of Social Engineering:
Trojan Horse
JL and Firasco
www.pizzaratings.com
IT-Security 9
Types of Social Engineering:
Quid pro Quo (something for something)
JL and Firasco
www.pizzaratings.com
IT-Security 10
Types of Social Engineering:
Pretexting
JL and Firasco
www.pizzaratings.com
IT-Security 11
How a Social Engineer
proceeds
1.) Research
Collect sufficient information about the target
which is going to be Social Engineered
– Internet
– Dumpster diving
JL and Firasco
www.pizzaratings.com
IT-Security 12
How a Social Engineer
proceeds
JL and Firasco
www.pizzaratings.com
IT-Security 13
How a Social Engineer
proceeds
JL and Firasco
www.pizzaratings.com
IT-Security 14
How a Social Engineer
proceeds
JL and Firasco
www.pizzaratings.com
IT-Security 15
How a Social Engineer
proceeds
JL and Firasco
www.pizzaratings.com
IT-Security 16
How a Social Engineer
proceeds
JL and Firasco
www.pizzaratings.com
IT-Security 17
How a Social Engineer
proceeds
Summary:
2. Gathering of information
3. Establish connection
4. Pretend to be someone you are not
5. Work your way to the main goal
6. Keep good relationship with the victim
7. Compile data
JL and Firasco
www.pizzaratings.com
IT-Security 18
Real world example of Social
Engineering (Click HERE to
play our movie)
JL and Firasco
www.pizzaratings.com
IT-Security 19
Why is Social Engineering so
successful
JL and Firasco
www.pizzaratings.com
IT-Security 20
Why is Social Engineering so
successful
JL and Firasco
www.pizzaratings.com
IT-Security 21
It’s discussion time
Is it ethical?
JL and Firasco
www.pizzaratings.com
IT-Security 22
Definition of “ethical”
JL and Firasco
www.pizzaratings.com
IT-Security 23
Is it ethical?
JL and Firasco
www.pizzaratings.com
IT-Security 24
Sources
JL and Firasco
www.pizzaratings.com
IT-Security 25
Why Social Engineering is so
successful (continued)
JL and Firasco
www.pizzaratings.com
IT-Security 26