{"id":51,"date":"2008-01-13T18:24:51","date_gmt":"2008-01-14T02:24:51","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/13\/social-engineering-your-way-into-a-dorm-room\/"},"modified":"2008-01-13T18:24:51","modified_gmt":"2008-01-14T02:24:51","slug":"social-engineering-your-way-into-a-dorm-room","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/13\/social-engineering-your-way-into-a-dorm-room\/","title":{"rendered":"Social Engineering Your Way Into a Dorm Room"},"content":{"rendered":"<p>  It is shocking to learn that while the University of Washington Housing and Food Services own nine residence halls with a total capacity of nearly 5000 students, the security barring access to individual students&#8217; rooms can be compromised with little more than a little research and a good story.  For the first homework assignment, I reviewed the security of the dorms.  I thought of ways to get into other residents&#8217; rooms and found that it wouldn&#8217;t be as difficult as one might hope.  I tried the &#8220;attack&#8221; on myself, trying to gain access to my own room.  It&#8217;s not surprising that I got into my room (in fact it&#8217;d be more surprising if I couldn&#8217;t), yet the attack could be used against others, especially those the adversary knows well.<br \/>\n<!--more--><br \/>\nAll the dorm entrances are protected with card readers.  Yet, anyone who has lived in the dorms knows how easy it is to tailgate your way into the dorms.  When my girlfriend lived in the dorms, she only had to come let me in two or three times.  The rest of the time I would tailgate my way in.  It wasn&#8217;t difficult at all.  No one likes to be the rude person to quickly close the door behind them.  Even if you get to the door and there&#8217;s no one to follow, it&#8217;s easy to wait until someone gets there and then fumble around in your pocket when they do.  Assuming you can&#8217;t find your card, they usually take compassion and simply open the door.  An &#8220;I forgot my card&#8221; works even better.<\/p>\n<p>While getting into the residence halls may be easy, getting into someone else&#8217;s room seems at first a lot more difficult.  Yet this last week, while reviewing the security of everything, as Yoshi prompted us, I began to doubt the security of my own room.  From lecture and the readings, bump keys and lockpicking were fresh in my mind, and although this would work, I felt that the neighboring residents may become curious of the pounding noise as you learn how to bump.  But what if the adversary had a key that fit my lock exactly?  Could they get this?  How?<\/p>\n<p>The answer was so simple, it scared me:  Ask for it.  Other than a little research, that&#8217;s practically all they&#8217;d have to do.  Let me backtrack.  When a resident looses their key, or locks it in their room, they go to the front desk and ask for it.  So, to test how hard it would be for someone to impersonate me, and gain my key, on my way to class I stopped at the front desk and asked for it.<\/p>\n<p>&#8220;Do you have your Student ID?&#8221;<br \/>\nMe: &#8220;No, it&#8217;s locked in my room.&#8221;<br \/>\n&#8220;Ok, I&#8217;ll need you to fill out this form.&#8221;<\/p>\n<p>She handed me a form that asked for name, hall, room number, phone number, my signature and the date.  She took the form behind the desk, talked her supervisor, and a few minutes later came back out with a few &#8220;security&#8221; questions.<\/p>\n<p>&#8220;What is your student ID number?&#8221;<br \/>\n&#8220;What is your birthday?&#8221;<br \/>\n&#8220;Who was your room mate last year?&#8221;<\/p>\n<p>I was shocked at how easy these questions were.  I have very little doubt that my roommate from last year would have any trouble with these questions, especially the last.  The best part is that after answering the questions correctly, she not only handed me a key to my room, but also a key card to get into the building.  Now the front desk was waiting for Chad-the-Resident to return the key, yet Chad-the-Resident had no idea that he had checked out a key nor did he have any reason to expect the fine for not returning it.  Chad-the-Adversary had the key and a key card to the hall.<\/p>\n<p>Student ID numbers are commonly tossed around, in fact, later that same day I had to sign up into a group for one of my courses.  The TA required us to put down our name, student ID number and the group number we wanted to be in.  Birthday&#8217;s are also easily obtained just by asking or perhaps by looking it up on facebook.  And the name of your last room mate would probably be well known by your circle of friends.<\/p>\n<p>Now, maybe there are cameras watching the front desk or the employee at the front desk checked my signature, yet it still was quite shocking that I could have greeted my last roommate with a hello and then handed him a key to his own room.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is shocking to learn that while the University of Washington Housing and Food Services own nine residence halls with a total capacity of nearly 5000 students, the security barring access to individual students&#8217; rooms can be compromised with little &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/13\/social-engineering-your-way-into-a-dorm-room\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,1,9],"tags":[38,39,37],"class_list":["post-51","post","type-post","status-publish","format-standard","hentry","category-ethics","category-miscellaneous","category-privacy","tag-dorms","tag-hfs","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}