close icon
Security

Black Hat Training: Achieving Security Awareness Through Social Engineering Attacks

Let’s cover the top 10 cybersecurity takeaways of my social engineering training at Black Hat.

August 27, 2018

I took the "Achieving Security Awareness Through Social Engineering Attacks" course at Black Hat this year!



It was eye-opening, tremendously interesting, and fun! It was facilitated by Jayson Street and April Wright. Jayson gets paid by companies to break into their own facilities through Social Engineering>). He shared many amazing stories, like the time he gained full access to a bank in Beirut in two and a half minutes.

Corgi dog meme, coding on computer

Source

Here’s a summary of what we discussed in the training, along with key takeaways:

OSINT and Social Media

“Information doesn’t have to be secret to the valuable” ~ CIA

One of the key elements of Social Engineering is Open-source Intelligence (OSINT), which is insight produced from data collected from publicly available sources. If you don’t have proper privacy settings in your social media accounts, the information you put there is public.

In class, we discussed the case of a guy named Travis who put pictures of his badge, passport, plane tickets, job title, workplace and even emails on Instagram.

We analyzed how someone that overposts on social media could be targeted, and it’s not a surprise that it’s relatively simple. We also talked about tools and techniques to get and find relevant information.

There was an exercise about drafting (not sending) a spear phishing email in 1 hour targeted at someone in our organization using OSINT. Nobody used their own workplace and nobody said where they worked, but we completed the task with good results.

Takeaway #1: Review your privacy settings and don’t post private information on social media.

"Review your privacy settings and don’t post private information on social media. Open-source Intelligence tools could be used to mine your data and create phishing opportunities."

Tweet

Tweet This

WiFi Pineapple and Bash Bunny

As part of the training, they gave us some interesting gadgets from Hak5 including a WiFi Pineapple and a Bash Bunny. They are tools meant to be used for penetration tests, and they have many pranks that can help with Security Awareness programs by showcasing their associated dangers in safe and controlled setups.

We also got a Packet Squirrel as an extra gift!

WiFi Pineapple

The WiFi Pineapple is a Wireless Auditing tool that can work as a Man-in-the-middle platform. Among others, it allows the owner to intercept an open WiFi connection and inspect and modify HTTP traffic, redirect the user to a malicious site, or associate with past public WiFi connections and “pretend” to be one of them.

For example, if you’re near a Pineapple while your phone has WiFi turned on and is actively looking for connections, all of the sudden you may connect to the airport network you used 6 months ago and a site may ask you to pay for the service. They mention it on the Silicon Valley TV Show.

This is the picture of a WiFi Pineapple Tower because… Black Hat.

WiFi Pineapple Tower at Black Hat Conference

Takeaway #2: Avoid open or public networks as much as possible, especially in crowded spaces. If you’re not in a trusted space, turn on WiFi only when you really need it.

"Avoid open or public networks as much as possible, especially in crowded spaces. If you’re not in a trusted space, turn on WiFi only when you really need it."

Tweet

Tweet This

Bash Bunny

The Bash Bunny is a USB attack platform that can emulate trusted USB devices like Gigabit Ethernet, serial, flash storage and keyboards.

Bash Bunny USB platform.

We did a couple of experiments in the class: First, we used a “prank” payload that rickrolls the target at a specific date and time. It took less than 20 seconds to deliver this payload.

Then we tested a “recon” payload and we could get the full terminal history, clipboard content, system users, ifconfig, WAN IP, and all installed applications. This took a little bit longer, but it was still fast and the computer was in sleep mode.

Takeaway #3: Don’t plug in random USB drives and be cautious when working on public spaces.

"Don’t plug in random USB drives and be cautious when working on public spaces."

Tweet

Tweet This

Conclusion and Other Takeaways

We talked about other topics such as policies, security awareness programs, memes and the importance of repetition during training. These are the top 10 Takeaways of the experience:

  1. Review your privacy settings and don’t post private information on social media.

  2. Avoid open or public networks as much as possible, especially in crowded spaces. If you’re not in a trusted space, turn on WiFi only when you really need it.

  3. Don’t plug in random USB drives and be cautious when working on public spaces.

  4. Clickbait is widely used in social engineering, don’t trust it.

  5. Before running phishing campaigns, there should be policies and formal training in place.

  6. Although potentially controversial, hard to spot spear phishing emails create a more impactful “teachable moment” (as Jayson says).

  7. Certain topics of Security Awareness training should be tailored by role. An organization should have a site that groups all this information and internal security-focused newsletters could be useful as well.

  8. Controlled live demos with tools like the WiFi Pineapple and the Bash Bunny help raise security awareness.

  9. Prizes and gamification support these efforts.

  10. It is important to always explain the purpose of the training, demo or campaign. We don’t ever want you to fail, we want to empower you and help make you one of our strongest lines of defense:

Security training at Black Hat Conference

"Security training and awareness campaigns make people the best line of cybersecurity defense"

Tweet

Tweet This

About Auth0

Auth0 by Okta takes a modern approach to customer identity and enables organizations to provide secure access to any application, for any user. Auth0 is a highly customizable platform that is as simple as development teams want, and as flexible as they need. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. For more information, visit https://auth0.com.

  • Twitter icon
  • LinkedIn icon
  • Faceboook icon