Abstract
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing.
Degree
MS
College and Department
Ira A. Fulton College of Engineering and Technology; Technology
Rights
http://lib.byu.edu/about/copyright/
BYU ScholarsArchive Citation
Meyers, Jared James, "Training Security Professionals in Social Engineering with OSINT and Sieve" (2018). Theses and Dissertations. 6863.
https://scholarsarchive.byu.edu/etd/6863
Date Submitted
2018-06-01
Document Type
Thesis
Handle
http://hdl.lib.byu.edu/1877/etd10125
Keywords
social engineering, open source intelligence, ethics, IEEE, ACM, red team, cyber kill chain, cyber security
Language
english