1.1 Compare and contrast different types of social engineering techniques Flashcards

1
Q

What is Phishing?

A

Phishing is a broad term used to describe the fraudulent acquisition of information, often focused on credentials like usernames and passwords, as well as sensitive personal information like credit card numbers and related data.

Phishing is most often done via email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Smishing?

A

Smishing is phishing via SMS (text) messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vishing?

A

Vishing is phishing via telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spam?

A

Unwanted emails or junk mail

Spam sometimes called unsolicited or junk e-mail, may not immediately seem like a social engineering technique, but spam often employs social engineering techniques to attempt to get recipients to open the message or to click on links inside of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SPIM?

A

Spam over instant messaging is instant messaging spam

Unwanted text messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spear Phishing?

A

Spear phishing targets specific individuals or groups in an organization in an attempt to gather desired information or access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Dumpster Diving?

A

Dumpster diving is retrieving potential sensitive information from a dumpster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Shoulder Surfing?

A

Shoulder surfing is the process of looking over a person’s shoulder to capture information like passwords or other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pharming?

A

Pharming attacks redirect traffic away from legitimate websites to malicious versions.

Pharming typically requires a successful technical attack that can change DNS entries on a local PC or on a trusted local DNS server, allowing the traffic to be redirected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tailgating?

A

Tailgating is a physical entry attack that requires simply following someone who has authorized access to an area so that as they open secured doors you can pass through as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Eliciting Information?

A

Eliciting information, often called elicitation, is a technique used to gather information without targets realizing they are providing it.

Techniques like flattery, false ignorance, or even acting as a counselor or sounding board are all common elements of an elicitation effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Whaling?

A

Whaling, much like Spear phishing, targets specific people, but whaling is aimed at senior employees like CEOs and CFOs “big fish” in the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Prepending?

A

Prepending can mean one of three things:

  1. Adding an expression or phrase, such as adding “SAFE” to a set of email headers to attempt to fool a user into thinking it has passed an anti spam tool
  2. Adding information as part of another attack to manipulate the outcome
  3. Suggesting topics via a social engineering conversation to lead a target toward related information the social engineer is looking for
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Identity Fraud?

A

Identity fraud, or identity theft, is the use of someone else’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Invoice scams?

A

Invoice scams, which involve sending fake invoices to organizations in hopes of receiving payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Credential harvesting?

A

Credential harvesting is the process of gathering credentials like usernames and passwords.

17
Q

what is Reconnaissance?

A

It means the gathering of information about a target, whether that is an organization, individual, or something else.

It comes in 3 forms:

Passive discovery, which are techniques that do not send packets to the target; like WHOIS lookups

Semi-passive discovery, which touches the target with packets in a non-aggressive fashion to avoid suspicion.

Active discovery, most aggressive techniques likely to be noticed by the target.

18
Q

What is Hoax?

A

Hoaxes, which are intentional falsehoods, come in a variety of forms ranging from virus hoaxes to fake news.

19
Q

What is impersonation?

A

Impersonation, where you act as if you are someone else, can be a limited form of identity fraud.

20
Q

What is Watering hole attack?

A

An attack strategy in which attackers guess or observe which website an organization often uses and targets or infects one or more of them with malware.

21
Q

What is Typosquatting?

A

Typo squatters use misspelled and slightly off but similar to the legitimate site URLs to conduct typosquatting attacks

22
Q

What is Pretexting?

A

Pretexting is the process of using a made-up scenario to justify why you are approaching an individual

23
Q

What are Influence campaigns?

A

A social engineering attack intended to manipulate the thoughts and minds of large groups of people.

1.Hybrid Warfare attacks using a mixture of conventional and unconventional methods and resources to carry out the campaigns.

  1. Social media, may use multiple social platforms leveraging multiple individuals to amplify the message.
24
Q

Principles (reasons for effectiveness)

A
  1. Authority, which relies on the fact that most people will obey someone who appears to be in charge or knowledgeable, regardless of whether or not they are.
  2. Intimidation relies on scaring or bullying an individual into taking a desired action.
  3. Consensus-based social engineering used the fact that people tend to want to do what others are doing to persuade them to take an action.
  4. Scarcity is used for social engineering in scenarios that make something look more desirable because it may be the last one available
  5. Familiarity-based attacks rely on you liking the individual or even the organization the individual is claiming to represent.
  6. Trust relies on a connection with the individual they are targeting. (Build a connection)
  7. Urgency relies on creating a feeling that the action must be taken quickly due to some reason or reasons.
25
Q

What is Social Engineering?

A

Social engineering is the practice of manipulating people through a variety of strategies to accomplish desired actions.