1.1 Compare and contrast different types of social engineering techniques. Flashcards
An attacker registers a domain name with a common misspelling of an existing domain. Users who misspell a URL in a web browser, arrive at the attacker’s website.
Typosquatting
the attacker steals a domain name by altering its registration information and then transferring the domain name to another entity.
Domain hijacking
Domain Name Server (DNS) exploit that involves registering a domain temporarily to see how many hits it generates within the five-day grace period.
Tasting
the act of continually registering, deleting, and reregistering a name within the five-day grace period without having to pay for it.
Kiting
Passive means of redirecting users from a legitimate website to a malicious one by corrupting the way the victim’s computer performs Internet name resolution.
Pharming
campaign specifically designed to steal account credentials. The attacker has more interest in selling the database of captured logins than trying to exploit them directly.
Credential harvesting
attack relies on the circumstance that a group of targets may use an unsecure third-party website, which the attacker has compromised.
A watering hole