Skip to main content
Social Engineering and Human Factors
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/
  6. Cyber Security Slidev Presentations/

Social Engineering and Human Factors

·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Social Engineering and Human Factors
#

Unit IV: Ethical Hacking
#

Lecture 29: Exploiting the Human Element in Cybersecurity
#

Course: Cyber Security (4353204) | Semester V | Diploma ICT | Author: Milav Dabgar

layout: default
#

Understanding Social Engineering
#

๐Ÿง  What is Social Engineering?
#

Social Engineering is the psychological manipulation of people to divulge confidential information or perform actions that compromise security.

๐Ÿ“Š Social Engineering Statistics
#

  • 98% of cyber attacks involve social engineering
  • Success rate: 95% of successful breaches
  • Average cost: $4.9 million per incident
  • Phishing emails: 3.4 billion sent daily
  • Click rate: 32% of users click phishing links
  • Credential harvest: 76% success rate

๐ŸŽญ Core Principles
#

Psychological Triggers:
  - Authority and urgency
  - Trust and reciprocity  
  - Fear and intimidation
  - Curiosity and greed
  - Social proof and compliance

๐ŸŽฏ Attack Categories
#

๐Ÿ“ง Digital Social Engineering
#

  • Phishing emails and spear phishing
  • Vishing (voice phishing) calls
  • Smishing (SMS phishing) messages
  • Social media manipulation
  • Website defacement and fake sites

๐Ÿข Physical Social Engineering
#

  • Tailgating and piggybacking
  • Pretexting with fake identities
  • Baiting with infected devices
  • Shoulder surfing and observation
  • Dumpster diving for information

๐Ÿ”— Hybrid Approaches
#

  • Watering hole attacks
  • Business Email Compromise (BEC)
  • Romance scams and long-term manipulation
  • Supply chain social engineering
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Phishing Attack Techniques
#

๐Ÿ“จ Email Phishing Methods
#

๐ŸŽฃ Generic Phishing
#

Mass Distribution Phishing:
  Targets: Large user bases
  Content: Generic messages
  Success Rate: 3-5%
  Examples:
    - "Verify your account"
    - "Security alert"
    - "Prize notification"
    - "Invoice attached"

๐Ÿน Spear Phishing
#

Targeted Phishing:
  Targets: Specific individuals/organizations
  Content: Personalized messages
  Success Rate: 70-90%
  Research Required:
    - LinkedIn profiles
    - Company information
    - Recent news/events
    - Personal details

๐Ÿ› ๏ธ Phishing Infrastructure
#

๐ŸŒ Domain Spoofing
#

# Typosquatting examples
amazon.com โ†’ amazom.com
google.com โ†’ googIe.com (capital i)
microsoft.com โ†’ microsooft.com
paypal.com โ†’ paypaI.com

# Subdomain spoofing
secure.paypal.phishing-site.com
login.microsoft.attacker.com

๐Ÿ“ง Email Spoofing
#

Email Header Manipulation:
  From Field Spoofing:
    - Display name impersonation
    - Similar domain usage
    - Reply-to redirection
  
  Technical Bypasses:
    - SPF record limitations
    - DKIM signature issues
    - DMARC policy gaps
    - Email client vulnerabilities
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Advanced Phishing Techniques
#

๐Ÿ”ง Technical Phishing Methods
#

๐ŸŒ Credential Harvesting
#

<!-- Fake login page HTML -->
<form action="harvest.php" method="POST">
  <h2>Microsoft Office 365 Sign In</h2>
  <input type="email" name="email" placeholder="Email" required>
  <input type="password" name="password" placeholder="Password" required>
  <button type="submit">Sign In</button>
</form>

<style>
/* Mimics legitimate Microsoft styling */
body { font-family: 'Segoe UI', Arial; }
.login-box { background: #fff; border: 1px solid #ccc; }
</style>

๐Ÿ“ฑ Multi-Factor Authentication Bypass
#

MFA Bypass Techniques:
  Real-time Phishing:
    - Capture credentials immediately
    - Prompt for MFA token
    - Relay authentication in real-time
    - Session hijacking post-authentication
  
  Tools and Frameworks:
    - Evilginx2 (reverse proxy)
    - Modlishka (flexible phishing)
    - SET (Social-Engineer Toolkit)
    - King Phisher (campaign management)

๐Ÿ“ž Voice and SMS Attacks
#

๐Ÿ—ฃ๏ธ Vishing (Voice Phishing)
#

Vishing Techniques:
  Caller ID Spoofing:
    - Legitimate number display
    - Government agency impersonation
    - Bank/financial institution calls
  
  Pretexting Scenarios:
    - "Account security verification"
    - "System maintenance notification"  
    - "Fraud prevention callback"
    - "Survey/research participation"
  
  Voice Tools:
    - Voice changers and modulators
    - Text-to-speech generators
    - Call center simulation
    - Background noise generation

๐Ÿ“ฑ Smishing (SMS Phishing)
#

SMS Attack Vectors:
  Short URL Abuse:
    - bit.ly/malicious-link
    - tinyurl.com/fake-bank
    - Custom domain redirects
  
  Common Pretexts:
    - "Package delivery issue"
    - "Account locked notification"
    - "Prize/lottery winnings"
    - "COVID-19 contact tracing"
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Physical Social Engineering
#

๐Ÿšช Physical Access Techniques
#

๐Ÿšถ Tailgating and Piggybacking
#

Access Methods:
  Tailgating:
    - Follow authorized person through door
    - Act naturally and confidently
    - Use distraction techniques
    - Dress appropriately for environment
  
  Piggybacking:  
    - Request access assistance
    - Carry packages or appear busy
    - Use fake visitor credentials
    - Exploit politeness and helpfulness
  
  Prevention Challenges:
    - Social courtesy norms
    - Busy environment distractions
    - Authority appearance bias
    - Trust assumptions

๐ŸŽญ Pretexting Scenarios
#

Common Pretexts:
  IT Support Personnel:
    - "System maintenance required"
    - "Password reset assistance"
    - "Network troubleshooting"
    - "Security audit compliance"
  
  Delivery Personnel:
    - Package delivery
    - Equipment installation
    - Maintenance services
    - Document pickup
  
  Authority Figures:
    - Government inspectors
    - Auditors and compliance
    - Law enforcement
    - Executive assistants

๐Ÿ“‹ Information Gathering
#

๐Ÿ—‘๏ธ Dumpster Diving
#

Valuable Targets:
  Physical Documents:
    - Employee directories
    - Network diagrams  
    - Password lists
    - Financial records
    - Meeting minutes
  
  Digital Storage:
    - Discarded hard drives
    - USB devices
    - Backup tapes
    - Printed emails
    - Configuration printouts
  
  Legal Considerations:
    - Property ownership laws
    - Privacy regulations
    - Trespassing concerns
    - Evidence handling

๐Ÿ‘€ Shoulder Surfing
#

Observation Techniques:
  Direct Observation:
    - Standing behind targets
    - Using reflective surfaces
    - Long-distance observation
    - Social engineering conversations
  
  Technical Assistance:
    - Hidden cameras
    - Telephoto lenses  
    - Audio recording devices
    - Keystroke loggers
  
  High-Value Locations:
    - Airport lounges
    - Coffee shops
    - Public transportation
    - Office environments
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Psychological Manipulation Techniques
#

๐Ÿง  Cognitive Biases Exploitation
#

โšก Authority and Urgency
#

Authority Bias:
  - Executive impersonation
  - Government agency claims
  - IT department requests
  - Vendor/supplier communications
  
Urgency Manipulation:
  - "Account will be closed"
  - "Security breach detected"
  - "Immediate action required"
  - "Limited time offer"
  
Combination Effects:
  - CEO fraud schemes
  - Emergency IT requests
  - Audit compliance demands
  - Legal notice responses

๐Ÿค Trust and Reciprocity
#

Trust Building:
  - Shared connections/references
  - Industry knowledge display
  - Helpful preliminary actions
  - Professional appearance
  
Reciprocity Triggers:
  - Free gifts or services
  - Insider information sharing
  - Problem-solving assistance  
  - Exclusive opportunities
  
Social Proof:
  - "Others have already..."
  - Testimonials and reviews
  - Peer pressure tactics
  - Bandwagon effects

๐Ÿ’ฐ Financial and Emotional Appeals
#

๐Ÿ˜จ Fear, Uncertainty, and Doubt (FUD)
#

Fear-Based Attacks:
  Security Threats:
    - "Account compromised"
    - "Virus detected"
    - "Identity theft alert"
    - "Legal action pending"
  
  Financial Concerns:
    - "Unauthorized transactions"
    - "Tax audit notice"
    - "Investment losses"
    - "Insurance claims"
  
  Personal Safety:
    - "Emergency situation"
    - "Health concerns"
    - "Family member issues"
    - "Location tracking"

๐ŸŽ Greed and Curiosity
#

Greed-Based Lures:
  - Lottery winnings
  - Investment opportunities
  - Job offers with high pay
  - Inheritance claims
  
Curiosity Exploitation:
  - "Confidential documents"
  - "Secret information"
  - "Exclusive access"
  - "Behind-the-scenes content"
  
Emotional Manipulation:
  - Romance scams
  - Charity fraud
  - Family emergency scenarios
  - Pet rescue stories
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Business Email Compromise (BEC)
#

๐Ÿ’ผ BEC Attack Types
#

๐ŸŽญ CEO Fraud
#

Scenario: "Urgent Wire Transfer"
  Target: Finance/Accounting staff
  Impersonation: C-level executive
  Request: Urgent financial transfer
  Urgency: "Confidential acquisition"
  
Common Phrases:
  - "Need this done ASAP"
  - "Don't discuss with anyone"
  - "Board meeting requirement"  
  - "Acquisition in progress"
  
Success Factors:
  - Executive travel timing
  - End-of-quarter pressure
  - Legitimate-looking emails
  - Authority compliance culture

๐Ÿ—๏ธ Vendor/Supplier Fraud
#

Scenario: "Account Update Required"
  Target: Accounts payable
  Impersonation: Trusted vendor
  Request: Bank account change
  Justification: "New banking system"
  
Attack Process:
  1. Vendor relationship research
  2. Email account compromise
  3. Payment redirection request
  4. Follow-up confirmation calls
  
Red Flags:
  - Sudden account changes
  - Different communication style
  - Urgency without verification
  - Non-standard processes

๐Ÿ”ง BEC Technical Methods
#

๐Ÿ“ง Email Account Takeover
#

# Account compromise techniques
def email_compromise_methods():
    methods = {
        'credential_stuffing': {
            'description': 'Reuse leaked passwords',
            'tools': ['Hydra', 'Burp Suite', 'Custom scripts'],
            'success_rate': 'Medium'
        },
        'password_spraying': {
            'description': 'Common passwords across users',
            'tools': ['SprayingToolkit', 'CredKing'],
            'success_rate': 'High'
        },
        'phishing_compromise': {
            'description': 'Targeted credential harvesting',
            'tools': ['Evilginx2', 'Modlishka'],
            'success_rate': 'Very High'
        }
    }
    return methods

# Email forwarding rules
def setup_stealth_forwarding():
    rules = {
        'outlook_rule': 'Forward emails containing "invoice" to attacker',
        'gmail_filter': 'Forward financial emails and delete originals',
        'stealth_timing': 'Activate during business hours only'
    }
    return rules

๐Ÿ•ต๏ธ Reconnaissance Techniques
#

Target Research:
  Public Sources:
    - Company website org charts
    - LinkedIn employee profiles
    - Press releases and news
    - SEC filings and reports
  
  Technical Reconnaissance:
    - Email pattern identification
    - Domain infrastructure mapping
    - Technology stack enumeration
    - Communication system analysis
  
  Social Media Intelligence:
    - Executive travel schedules
    - Company event participation
    - Employee personal information
    - Relationship mapping
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Social Engineering Toolkits
#

๐Ÿ› ๏ธ Technical Frameworks
#

๐ŸŽฏ Social-Engineer Toolkit (SET)
#

# SET installation and usage
git clone https://github.com/trustedsec/social-engineer-toolkit/
cd social-engineer-toolkit
python setup.py install

# SET menu options
./setoolkit

# Common SET attacks
1) Social-Engineering Attacks
   1) Spear-Phishing Attack Vectors
   2) Website Attack Vectors  
   3) Infectious Media Generator
   4) Create a Payload and Listener
   5) Mass Mailer Attack

๐Ÿ“ง Email Campaign Tools
#

GoPhish Framework:
  Features:
    - Campaign management
    - Template creation
    - Real-time tracking
    - Detailed reporting
  
  Capabilities:
    - Landing page cloning
    - Email template design
    - User tracking and analytics
    - Training integration
  
King Phisher:
  Features:
    - Professional phishing campaigns
    - Advanced templating
    - Plugin architecture
    - Detailed statistics

๐ŸŽญ Pretexting Resources
#

๐Ÿ“ž Vishing Tools
#

Voice Manipulation:
  - Ventrillo (voice changer)
  - MorphVOX (real-time voice)
  - Adobe Audition (recording/editing)
  - SpoofCard (caller ID spoofing)
  
Background Audio:
  - Office environment sounds
  - Call center audio loops
  - Traffic and public spaces
  - Emergency service sounds
  
Script Templates:
  - IT helpdesk scenarios
  - Bank security departments
  - Government agencies
  - Vendor support calls

๐ŸŽจ Visual Deception
#

Credential Harvesting Pages:
  - HTTrack (website cloning)
  - Social-Engineer Toolkit
  - Custom HTML/CSS development
  - Domain spoofing services
  
Physical Props:
  - Fake identification badges
  - Clipboard and official forms
  - Branded clothing/uniforms
  - Business cards and letterhead
  
Documentation:
  - Vendor contracts
  - Government identification
  - Official letterhead
  - Authorization forms
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Defensive Countermeasures
#

๐Ÿ›ก๏ธ Technical Controls
#

๐Ÿ“ง Email Security
#

Email Authentication:
  SPF Records:
    - Specify authorized mail servers
    - Prevent from field spoofing
    - Configure hard fail policies
  
  DKIM Signatures:
    - Cryptographic email signing
    - Message integrity verification
    - Reputation-based filtering
  
  DMARC Policies:
    - Domain-based message authentication
    - Reporting and forensics
    - Quarantine/reject configuration

๐Ÿ”’ Multi-Factor Authentication
#

MFA Implementation:
  Strong Factors:
    - Hardware tokens (YubiKey)
    - Biometric authentication
    - Certificate-based authentication
    - Push notifications with context
  
  Weak Factors to Avoid:
    - SMS-based codes
    - Email-based tokens
    - Security questions
    - Static passwords

๐Ÿ‘ฅ Human-Centered Defenses
#

๐Ÿ“š Security Awareness Training
#

Training Components:
  Threat Recognition:
    - Phishing identification
    - Social engineering tactics
    - Pretexting scenarios
    - Physical security awareness
  
  Response Procedures:
    - Incident reporting process
    - Verification protocols
    - Escalation procedures
    - Communication guidelines
  
  Regular Testing:
    - Simulated phishing campaigns
    - Social engineering assessments
    - Security culture metrics
    - Continuous improvement

๐Ÿข Organizational Policies
#

Security Policies:
  Verification Procedures:
    - Multi-person authorization
    - Out-of-band verification
    - Standard communication channels
    - Change management processes
  
  Physical Security:
    - Visitor management systems
    - Employee escort requirements
    - Secure disposal procedures
    - Clean desk policies
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: default
#

Practical Exercise: Social Engineering Simulation
#

๐ŸŽฏ Ethical Social Engineering Assessment (30 minutes)
#

Mission: Security Awareness Evaluation
#

Design a comprehensive social engineering assessment for “EduTech Solutions” to evaluate their security awareness and response procedures.

๐ŸŽ“ Target Organization Profile
#

Company Details:

  • Education technology company (250 employees)
  • Remote and hybrid workforce (60% remote workers)
  • Multiple office locations (headquarters + 3 branch offices)
  • High-value data (student records, financial information)
  • Recent security training completed 6 months ago

Phase 1: Assessment Strategy Design (12 minutes)
#

Team Task: Multi-Vector Assessment Planning

  1. Digital Social Engineering Vectors

    • Design phishing email campaigns (3 different approaches)
    • Plan vishing (voice phishing) scenarios
    • Create smishing (SMS phishing) messages
    • Develop social media reconnaissance strategy
  2. Physical Social Engineering Assessment

    • Design tailgating/piggybacking scenarios
    • Plan pretexting approaches for office access
    • Create baiting strategies (USB drops, etc.)
    • Develop information gathering techniques

Phase 2: Campaign Development (10 minutes)
#

Technical Implementation Planning:

  1. Phishing Campaign Design

    • Create email templates for different employee roles
    • Design credential harvesting landing pages
    • Plan multi-stage phishing sequences
    • Develop tracking and analytics approach
  2. Social Engineering Scenarios

    • Script development for voice-based attacks
    • Physical access attempt procedures
    • Pretext development and role-playing
    • Evidence collection and documentation

Phase 3: Ethical Considerations and Reporting (8 minutes)
#

Professional Assessment Framework:

  1. Ethical Guidelines and Boundaries

    • Define authorized testing scope and limits
    • Create employee protection procedures
    • Establish data handling and privacy protocols
    • Design psychological safety measures
  2. Measurement and Reporting

    • Define success metrics and KPIs
    • Create educational reporting approach
    • Plan remediation training programs
    • Design follow-up assessment procedures

Deliverables:

  • Comprehensive social engineering assessment methodology
  • Multi-vector campaign design with technical specifications
  • Ethical framework and professional conduct guidelines
  • Educational reporting template focused on improvement
Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: center class: text-center
#

Questions & Discussion
#

๐Ÿค” Ethical Reflection Points:
#

  • How do you balance realistic testing with employee psychological safety?
  • What are the ethical boundaries in social engineering assessments?
  • How can organizations build resilience without creating fear?

๐Ÿ’ก Exercise Review
#

Present your social engineering assessment strategies and discuss ethical approaches

Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar

layout: center class: text-center
#

Thank You!
#

Next Lecture: Wireless Network Security Testing
#

Securing the Airwaves
#

Cyber Security (4353204) - Lecture 29 Complete

The human factor: Security's greatest challenge and opportunity! ๐Ÿง ๐Ÿ”

Course: Cyber Security (4353204) | Unit IV | Lecture 29 | Author: Milav Dabgar