1.1 Social Engineering Techniques Flashcards

1
Q

Typosquatting / Sting Site / Fake URL / URL Hijacking

A

A user types www.gooogle.com into their address bar and get redirected to a malicious website that freezes up their browser and warns that their computer has been infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pharming

A

Redirect a legit website to a bogus site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

Voice Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smishing

A

Phishing done by text message / SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reconnaissance

A

Gather information on the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

Targeting a specific individual or group within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

Spear Phishing the CEO/CFO of a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impersonation

A

Pretending to be someone else to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eliciting Information

A

Extracting information from a victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dumpster Diving

A

Diving in the dumpster…. literally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shoulder Surfing

A

Gathering information from afar, such as webcam monitoring, looking at the info through a mirror, binoculars/telescopes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tailgating

A

Following someone into a restricted area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hoax

A

A threat that doesn’t actually exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Watering Hole Attack

A

A web server has been compromised and is being used to target web traffic in order to deploy malware or collect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPAM

A

Unsolicited messages from texts, email, forums, etc.
Unsolicited email, Trackback, negative SEO attacks, spiders, and malware warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPIM

A

Spam over Instant Messenger

17
Q

rDNS

A

Reverse Domain Name Service lookup of a domain name from an IP address

18
Q

Influence Campaigns

A

This type of campaign, also known as a misinformation operation, involves collecting tactical information, determining key stakeholders, and launching propaganda campaigns, often to gain a competitive advantage

19
Q

Invoice Scam

A

A false email from a seemingly reputable entity or a high-level manager requesting a payment and may even link to a “pay” website

20
Q

AUP

A

Acceptable Use Policy

21
Q

Hybrid Warfare

A

Involves traditional warfare as well as incorporation of the cyber realm in a non-traditional way

22
Q

BEC (Business Email Compromise)

A

Often targets companies who outsource, perform wire xfers, or use suppliers from abroad by creating phony invoices, using C-Team fraud, compromising their email accounts, or impersonating an attorney or trusted person.

23
Q

Xfer

A

Transfer / move oneself from one location or job to another

24
Q

SMTP

A

Simple Mail Transfer Protocol:
Internet standard communication protocol for electronic mail transmission

25
Q

Credential Harvesting

A

Harvesting passwords and login credentials

26
Q

Smishing

A

Phishing is done by text message / SMS