Social Engineering Attacks
Techniques leveraging human psychology to breach security.
Methods of Influence
- Authority: Compliance due to perceived power
- Impersonate bosses, IRS agents
- Urgency: Prompt action under time pressure
- “Reset your password now for meeting”
- Social Proof: Influence via others’ behavior
- Fake likes/shares; use mutual connections
- Scarcity: Limited availability prompts action
- “Only 3 seats left—register now!”
- Likeness: Build rapport via shared interests
- Friendly banter, flirting to gain trust
- Fear: Threat-based compliance
- Fake FBI warning; ransomware scare
Phishing Campaigns
- Phishing: Mass fraudulent emails to steal credentials
- Spearphishing: Targeted emails using personal info
- Whaling: High-stakes phishing of executives
- Business Email Compromise (BEC): Hijack corporate accounts
- Vishing: Voice-based social engineering
- Smishing: SMS-based phishing
Also look into
settoolkit
this is a robust tool that I personally like when it comes to social engineering.
Gophish (Phishing Simulation)
- Open-source phishing framework
- Setup a Campaign:
- Define Sending Profile (SMTP host, port, from address)
- Create Email Template (mimic IT dept)
- Launch Campaign: track opens, clicks, submissions
- Example Send Profile:
Name: Morning Catch
Interface: SMTP
From: Boyd Jenius <bjenius@morningcatch.ph>
Host: 192.168.56.101:25
Impersonation & Pretexting
- Impersonation: Pretend to be trusted roles
- Delivery person, support technician
- Physical Pen Tests:
- Wear uniforms (UPS, ISP logos) to enter restricted areas
- Elicitation: Extract info via conversation
- Ask to print test page to see copier IP
Surveillance Techniques
- Eavesdropping: Listen to conversations (bugs, overhearing)
- Shoulder Surfing: Observe screens/keypads in public
- Dumpster Diving: Recover sensitive data from trash
Watering Hole Attacks
Compromise sites frequented by targets:
- Recon: Identify popular sites
- Compromise: Inject malicious code or ads
- Infection: Visitors unwittingly download malware
- Defenses: patch sites, use filters, employee training
Evilginx (MFA-Bypassing Phishing)
- MITM Proxy: Hooks victims’ sessions via reverse proxy
- Process:
- Host real-time clone of login page
- Capture credentials + session tokens
- Hijack account even with MFA
Tailgating & Piggybacking
- Tailgating: Unauthorized entry behind someone
- Piggybacking: Invited entry by authorized person
- Prevention: mantraps, security personnel, training
Browser Exploitation Framework (BeEF)
- Exploits browser vulnerabilities via XSS hooks
- Workflow:
- Hook browser via malicious JS
- Control sessions through GUI modules
- Modules: steal cookies, keylogger, screenshots
Tip: Ethical use only in authorized engagements to highlight browser security gaps.