Page 1236 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1236

attackers use these tools.

               Social-engineering techniques are often used during penetration tests.
               Depending on the goal of the test, the testers may use techniques to

               breach the physical perimeter of an organization or to get users to
               reveal information. These tests help determine how vulnerable
               employees are to skilled social engineers, and how familiar they are
               with security policies designed to thwart these types of attacks.







                   Social Engineering in Pentests


                  The following example is from a penetration test conducted at a
                  bank, but the same results are often repeated at many different
                  organizations. The testers were specifically asked if they could get
                  access to employee user accounts or employee user systems.


                  Penetration testers crafted a forged email that looked like it was
                  coming from an executive within the bank. It indicated a problem
                  with the network and said that all employees needed to respond
                  with their username and password as soon as possible to ensure
                  they didn’t lose their access. Over 40 percent of the employees
                  responded with their credentials.

                  Additionally, the testers installed malware on several USB drives

                  and “dropped” them at different locations in the parking lot and
                  within the bank. A well-meaning employee saw one, picked it up,
                  and inserted it into a computer with the intent of identifying the
                  owner. Instead, the USB drive infected the user’s system, granting
                  the testers remote access.

                  Both testers and attackers often use similar methods successfully.

                  Education is the most effective method at mitigating these types of
                  attacks, and the pentest often reinforces the need for education.




               Protect Reports
               Penetration testers will provide a report documenting their results,
   1231   1232   1233   1234   1235   1236   1237   1238   1239   1240   1241