Thursday 1 December 2011

Reverse Social Engineering Sabotage Methods

The first step of RSEing is to disable the target computer or the user's ability to use that computer. Generally this means you will be disabling a user's workstation, terminal or computer so that he or she can not access the system properly. You want to do something that is hard to detect yet easy to correct. Here is a list of five
general ideas, ranging in the amount of setup time and system familiarity required:

• Alter a parameter, the kind of parameter that novices don't know about or think about. Examples: default
printer port, screen colors, macros, obscure printer codes, technical peripheral settings.
• Set files to read-only, or rename them, or make them invisible in their directories.
Example: if
• WP.EXE is the word processor used, change the name to WP.$A$.
• Hardware tampering. Examples: switch a color monitor to monochrome mode; reverse disk drives;
disconnect or loosen the keyboard, or unplug the computer or surge protector.
• Install memory-clogging TSR programs. User won't know why program fails to run.
• Run a simulation program, such as an operating system simulation, which gives lots of ugly error messages.

WARNING!
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
Sabotage should not be permanently harmful to the user or the computer! Do NOT
delete files or directories: they may become unrecoverable. Do NOT install viruses:
they can easily get out of hand. Do NOT sabotage in a way such that the operating
system refuses to boot: they may not have a bootable DOS disk handy when they
call you later!
••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••