1.1 Flashcards
Compare and contrast different types of social engineering
Phishing
Social engineering combined with spoofing
Typosquating
Type of url highjacking, buys misspelled domains of trusted ones - Googel.com vs Google.com
Pharming
Redirecting a legitimate website to a bogus site
Vishing
It’s phishing, but over the phone
Smishing
It’s phishing, but it’s over text
Spear Phishing
Targeted phishing attacks, usually fueled by information gathered to recon
Impersonation
Attackers pretend to be someone they aren’t
Identity Fraud
Attackers using your identity to perform attacks in other places (Credit Car Fraud, Bank Fraud, Government Fraud…)
Dumpster Diving
Valid way to gather important details, details that can be used for attacks
Spam
Unsolicited Messages
SPIM
Spam over instant messaging
Tailgating
Use an authorized person to gain unauthorized access to a building.
Invoice Scams
Attacker sends fake invoice, usually paired with spear phishing.
Credential Harvesting
Attackers target stored credentials on your computer.