kevin mitnick

40
The Art of Deception

Upload: karan-bansal

Post on 01-Jul-2015

212 views

Category:

Software


0 download

DESCRIPTION

A presentation on the book "The Art Of Deception by Kevin Mitnick "

TRANSCRIPT

Page 1: Kevin Mitnick

The Art of Deception

Page 2: Kevin Mitnick

Kevin Mitnick

Famous Social Engineer Hacker• Went to prison for hacking• Became ethical hacker

"People are generally helpful, especially to someone who is nice, knowledgeable or insistent."

Page 3: Kevin Mitnick

Kevin Mitnick

Arrested and convicted on several counts of computer crime,

including hacking and theft of intellectual property

Page 4: Kevin Mitnick

Kevin Mitnick

Arrested and convicted on several counts of computer crime,

including hacking and theft of intellectual property

Began at age 12 with faking punch cards for the bus system to

gain free rides and continued on to phone phreaking.

Page 5: Kevin Mitnick

Kevin Mitnick

Arrested and convicted on several counts of computer crime,

including hacking and theft of intellectual property

Began at age 12 with faking punch cards for the bus system to

gain free rides and continued on to phone phreaking.

Used social engineering to steal passwords to company systems.

Page 6: Kevin Mitnick

Kevin Mitnick

Arrested and convicted on several counts of computer crime,

including hacking and theft of intellectual property

Began at age 12 with faking punch cards for the bus system to

gain free rides and continued on to phone phreaking.

Used social engineering to steal passwords to company systems

He still believes this is far easier to do, even today, than hacking

into a system.

Page 7: Kevin Mitnick

Kevin Mitnick

Arrested and convicted on several counts of computer crime,

including hacking and theft of intellectual property

Began at age 12 with faking punch cards for the bus system to

gain free rides and continued on to phone phreaking.

Used social engineering to steal passwords to company systems

He still believes this is far easier to do, even today, than hacking

into a system.

Since his release from prison, Kevin has started his own computer

security company and gives talks around the country about social

engineering and other security topics.

Page 8: Kevin Mitnick
Page 9: Kevin Mitnick

What is Social Engineering?

Page 10: Kevin Mitnick

What is Social Engineering?

• Attacker uses human interaction to obtain or compromise information

Page 11: Kevin Mitnick

What is Social Engineering?

• Attacker uses human interaction to obtain or compromise information

• Attacker my appear unassuming or respectableo Pretend to be a new employee, repair man, etc.o May even offer credentials

Page 12: Kevin Mitnick

What is Social Engineering?

• Attacker uses human interaction to obtain or compromise information

• Attacker my appear unassuming or respectableo Pretend to be a new employee, repair man, etc.o May even offer credentials

• By asking questions, the attacker may piece enough information together to infiltrate a companies networko May attempt to get information from many sources

Page 13: Kevin Mitnick

Kevin Mitnick - Art of Deception:

Page 14: Kevin Mitnick

Kevin Mitnick - Art of Deception:

• "People inherently want to be helpful and therefore are easily duped"

Page 15: Kevin Mitnick

Kevin Mitnick - Art of Deception:

• "People inherently want to be helpful and therefore are easily duped"

• "They assume a level of trust in order to avoid conflict"

Page 16: Kevin Mitnick

Kevin Mitnick - Art of Deception:

• "People inherently want to be helpful and therefore are easily duped"

• "They assume a level of trust in order to avoid conflict"

• "It's all about gaining access to information that people think is innocuous when it isn't"

Page 17: Kevin Mitnick

Kevin Mitnick - Art of Deception:

• "People inherently want to be helpful and therefore are easily duped"

• "They assume a level of trust in order to avoid conflict"

• "It's all about gaining access to information that people think is innocuous when it isn't"

• Here a nice voice on the phone, we want to be helpful

Page 18: Kevin Mitnick

Kevin Mitnick - Art of Deception:

• "People inherently want to be helpful and therefore are easily duped"

• "They assume a level of trust in order to avoid conflict"

• "It's all about gaining access to information that people think is innocuous when it isn't"

• Here a nice voice on the phone, we want to be helpful

• Social engineering cannot be blocked by technology alone

Page 19: Kevin Mitnick

Examples of Social Engineering

Page 20: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco office

Page 21: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco officeo Tells guard he will get a new badge

Page 22: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco officeo Tells guard he will get a new badgeo Pretend to work there, give manager name from another

branch

Page 23: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco officeo Tells guard he will get a new badgeo Pretend to work there, give manager name from another

brancho Fakes a phone conversation when caught

Page 24: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco officeo Tells guard he will get a new badgeo Pretend to work there, give manager name from another

brancho Fakes a phone conversation when caught

• Free food at McDonalds

Page 25: Kevin Mitnick

Examples of Social Engineering

• Kevin Mitnick talks his way into central Telco officeo Tells guard he will get a new badgeo Pretend to work there, give manager name from another

brancho Fakes a phone conversation when caught

• Free food at McDonalds

Page 26: Kevin Mitnick

Live Example

Page 27: Kevin Mitnick

Live Example

• Convinced friend that I would help fix their computer

Page 28: Kevin Mitnick

Live Example

• Convinced friend that I would help fix their computer

• People inherently want to trust and will believe someone when they want to be helpful

Page 29: Kevin Mitnick

Live Example

• Convinced friend that I would help fix their computer

• People inherently want to trust and will believe someone when they want to be helpful

• Fixed minor problems on the computer and secretly installed remote control software

Page 30: Kevin Mitnick

Live Example

• Convinced friend that I would help fix their computer

• People inherently want to trust and will believe someone when they want to be helpful

• Fixed minor problems on the computer and secretly installed remote control software

• Now I have total access to their computer through ultravnc viewer

Page 31: Kevin Mitnick

Weakest Link?

Page 32: Kevin Mitnick

Weakest Link?

• No matter how strong your:o Firewallso Intrusion Detection Systemso Cryptographyo Anti-virus software

Page 33: Kevin Mitnick

Weakest Link?

• No matter how strong your:o Firewallso Intrusion Detection Systemso Cryptographyo Anti-virus software

• You are the weakest link in computer security!o People are more vulnerable than computers

Page 34: Kevin Mitnick

Weakest Link?

• No matter how strong your:o Firewallso Intrusion Detection Systemso Cryptographyo Anti-virus software

• You are the weakest link in computer security!o People are more vulnerable than computers

• "The weakest link in the security chain is the human element" -Kevin Mitnick

Page 35: Kevin Mitnick

Conclusion

Social Engineering will always exist, and it is

extremely difficult to defend against, but the

success of such attacks can be decreased

substantially with proper policy and personnel

training

Page 36: Kevin Mitnick

Policy from a Social Engineer

“The Art of Deception” – K. Mitnick

Page 37: Kevin Mitnick

Policy from a Social Engineer

“The Art of Deception” – K. Mitnick

Kevin Mitnick outlines an excellent security policy at

the end of the book with detailed reasoning at every

level to defend against Social Engineering Attacks.

Page 38: Kevin Mitnick

Policy from a Social Engineer

“The Art of Deception” – K. Mitnick

Kevin Mitnick outlines an excellent security policy at

the end of the book with detailed reasoning at every

level to defend against Social Engineering Attacks.

This book teaches you the tricks of deception so that

you can learn how to protect against them.

Page 39: Kevin Mitnick

Policy from a Social Engineer

“The Art of Deception” – K. Mitnick

Kevin Mitnick outlines an excellent security policy at

the end of the book with detailed reasoning at every

level to defend against Social Engineering Attacks.

This book teaches you the tricks of deception so that

you can learn how to protect against them.

This is a must read for all security professionals.

Page 40: Kevin Mitnick

Questions?