Infiltrator Posted August 1, 2010 Share Posted August 1, 2010 HACKERS at an infamous DefCon gathering are proving that old-fashioned smooth talk rivals slick software skills when it comes to pulling off attacks on computer networks. A first-ever "social engineering'' contest challenges hackers to call workers at 10 companies including technology titans Google, Apple, Cisco, and Microsoft and get them to reveal too much information to strangers. "Out of all the companies called, not one company shut us down,'' said Offensive Security operations manager Christopher Hadnagy, part of the social-engineer.org team behind the competition. The team kept hackers within the boundaries of the law, but had them coax out enough information to show that workers would have unintentionally made it easier to attack networks. Workers that unknowingly ended up on calls with hackers ranged from a chief technical officer to IT support personnel and sales people. One employee was conned into opening programs on a company computer to read off specifications regarding types of software being used, details that would let a hacker tailor viruses to launch at the system. "You often have to crack through firewalls and burn the perimeter in order to get into the internal organisation,'' Mati Aharoni of Offensive Security, a company that tests company computer defences, said. "It is much easier to use social engineering techniques to get to the same place.'' Other companies targeted were Pepsi, Coca Cola, Shell, BP, Ford, and Proctor & Gamble. The contest, still taking place at DefCon and promises the winner an Apple iPad tablet computer, is intended to show that hardened computer networks remain vulnerable if people using them are soft touches. "We didn't want anyone fired or feeling bad at the end of the day,'' Aharoni said." We wanted to show that social engineering is a legitimate attack vector.'' A saying that long ago made it onto T-shirts at the annual DefCon event is ``There is no patch for human stupidity.'' "Companies don't think their people will fall for something as simple as someone calling and just asking a few questions,'' Hadnagy said." It doesn't require a very technical level of attacker,'' Aharoni added. ``It requires someone with an ability to schmooze well.'' One worker nearly foiled a hacker by insisting he send his questions in an email that would be reviewed and answered if appropriate. The hacker convinced the worker to change his mind by claiming to be under pressure to finish a report for a boss by that evening. "As humans, we naturally want to help other people,'' Hadgagy said. "I'm not advocating not helping people. Just think about what you say before you say it.'' Information about "exploiting human vulnerabilities'' was available at the social-engineer.org website. Original article can be found here: http://www.news.com.au/technology/hackers-...r-1225899446290 Quote Link to comment Share on other sites More sharing options...
The Sorrow Posted August 6, 2010 Share Posted August 6, 2010 go social engineering Quote Link to comment Share on other sites More sharing options...
Zimmer Posted August 6, 2010 Share Posted August 6, 2010 Ford why not GM Quote Link to comment Share on other sites More sharing options...
Infiltrator Posted August 8, 2010 Author Share Posted August 8, 2010 go social engineering Kevin Mitnick ruled back in the old days. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.