Skip to main content
Security Assessment

Social Engineering Teaming Service: Protect Your Organization from On-Site Infiltration

By November 16, 2021No Comments

After spending the better part of the last two years working remotely, employees are beginning to filter back into their office buildings. Their return is greeted by familiar faces, fresh new faces, and probably some forgotten faces as well. The newness of being back in an office building makes this a perfect time to test their understanding of company “unknown personnel” policies. The Social Engineering Teaming Service (SE Teaming) is an excellent way to do this.

SE Teaming can include nighttime and/or daytime entries. Nighttime tasks may include breaking in via lockpicking (as determined by scope), while daytime entries tend to rely more heavily on rapport building and influence techniques. Our social engineers are masters at talking their way into your business and, once inside, they will see how far they can invade using the impersonation attack vector. They talk their way past the guard stations and, from there, past other barriers. These might be set up in front of more sensitive areas – like server rooms and Network Operations Command (NOC) centers.
Social Engineering Teaming Service

It All Begins with OSINT (Open-Source Intelligence)

Well… the attacks begin with OSINT. Before the attacks begin, we work with the client to determine the scope of the engagement. First, our project managers get clarification on which parts of the client’s property are off limits and which parts they would like us to test. Then we have a scope discussion to solidify the boundaries of the upcoming engagement. And finally, during the engagement, we continue to check in with our client contacts.

The first step of our offensive action is a thorough OSINT examination of our target company and locations. We use freely available online sources to find any information that will help us in our upcoming attacks. OSINT has multiple uses for impersonation. For example, it gives information about the buildings we will be infiltrating. Additionally, it gives us themes with which we can create pretexts which are the reasons we will give for being in the building.

During OSINT, we look for a wide range of things. Information about company culture gives us insights into how we should dress and behave. Sometimes we can find pictures of ID badges that we can use to create counterfeits. Floor plans will help us navigate our way through buildings once we are in, and may even lead us to the more sensitive, higher-security areas that we are looking for. Vendor information can be very helpful in pretext creation and can sometimes get us a company escort who can let us into high-security areas.

Implementing the Attack

Once the OSINT is compiled, pretexts are finalized, and a date is set, the engagement can begin. On a previous campaign, SECOM discovered that the license for the client’s GPS clock service was about to expire. So, the team used this for our pretext, posing as the GPS clock company doing a routine check as part of the license renewal process. Early on in those attacks, the team discovered that this pretext was not enough to get them past the front door guards. But following some real employees in through a back door (tailgating) helped get them into more secure areas of the building.

Getting past the door

Getting past the door guards to test the rest of the employee population can be tricky. We have used tactics such as:

  • tailgating;
  • pretending a badge was malfunctioning until someone else let us in; and
  • walking in through an open loading dock.

Some more complicated tactics have been having someone distract the guards. While this happened, a pair of social engineers walked past, pretending to be involved in an important phone call. Another time one team member went in through the front and printed themselves a guest badge at a terminal in the lobby, while another snuck in through a back door with a fake badge and pretended to be the other’s required company escort.

Inside the target building

Once we are  inside the target building, the scope of the project determines what the team does next. Some projects only require that we get into the building and take photos and video as proof. In these cases, photos of more sensitive materials have more impact. However, on other projects we may drop USB devices with tempting labels like “salary” or “bonuses.” These will have a file on them which will tell us if someone opened it on their machine. Trying to use a USB device to install pseudo-malicious software on unattended, or possibly attended, computers is also an option. Finding a way to talk target employees into letting us try that one is a fun, high-risk/high-reward social engineering attack simulation. Social-Engineer’s COO, Ryan MacDougall, discusses some of these attacks in his Defcon 29 talk SE Team Vs. Red Team.

Request a Quote

The novelty of returning to an office building after nearly two years of solitary, remote work makes this a perfect time to test the security posture of your organization with an SE Teaming engagement. After the engagement, you will receive a detailed report of your business’s vulnerability landscape. See how well your personnel fare against smooth-talking strangers or unannounced visits from important “vendors.” Test their response to tempting USB drives, and innocent-seeming requests for help. Your report will have detailed accounts of all of our findings. It will also have recommendations for shoring up any holes we find in your security measures. You can request a quote on our Social Engineering Teaming Service page at www.social-engineer.com.

Sources:
https://www.social-engineer.org/framework/psychological-principles/instant-rapport/
https://www.social-engineer.org/framework/influencing-others/influence-tactics/
http://www.www.social-engineer.com/breaking-in-for-noobz-social-engineering-onsite-infiltration/
https://www.social-engineer.org/resources/sevillage-at-def-con-29-se-team-vs-red-team-ryan-macdougall/
http://www.www.social-engineer.com/services/social-engineering-teaming-service/

Image:
https://unsplash.com/@martinirc?utm_source=unsplash&utm_medium=referral&utm_content=creditCopyText

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.