1.1 Social engineering attacks Flashcards
What is phishing ?
Social engineering with a touch of spoofing (dellivered by mail, ect)
How to spot phishing attack ?
check the URL, spelling, fonts, graphic
How phishing attack are so successful?
By trycking us using typosquatting (type of URL hijacking = pretend to be a legitimate URL)
What is pharming and it can be related to phishing?
redirection a legit website to a bogus site. It is done by poisonning the DNS server. So the pharming tqke plqce to redirect ppl on the attacker website and phishing take place when the victim enter its credentials. It is difficult to recognise by anti malware
What is Vishing ?
Voice phishing is done via phone, qsking for personal info
How to conduct a phishing attack ?
1/ Reconnaissance: gather info on the victim
2/ Background info (corporate web site etc)
3/ Attacker builds a believable pretext
What is spear phishing attack and whaling ?
Target phishing with inside information to make the attack more believable. Whaling is a spear phishing attack that target the CEO or CFO
What is impersonation ?
attackers pretend to be someone they are not, they use info gathered during the reconnaissance phase and pretend to be a person in higher rank to get info on the victims. It can be done via Vishing.
What can be the consequences of impersonation ?
The attacker can use to victims info fo credit card fraud, bank fraud, loan fraud and government benefit fraud (tax etc)
How to protect against impersonation?
nerver give information
verify before revealing info
What is dumpster diving attack ?
attacker trying to get information by the stuffs you thrown in a trash
How to prevent from dumpster diving?
- secure the garbage with locker
- shred your document
What is shoulder surfing ?
looking over someone shoulder to have access to important info (password, sensitive info etc)
How to prevent shoulder surfing?
1/ control your iput and be aware of your surrounding
2/ use privacy filters
3/ keep monitor out of the sight (window etc)
What is Hoaxes attack ?
a threat that doesn’t actually exist