1.1 Social Engineering Techniques Flashcards
Typosquatting / Sting Site / Fake URL / URL Hijacking
A user types www.gooogle.com into their address bar and get redirected to a malicious website that freezes up their browser and warns that their computer has been infected
Pharming
Redirect a legit website to a bogus site
Vishing
Voice Phishing
Smishing
Phishing done by text message / SMS
Reconnaissance
Gather information on the victim
Spear Phishing
Targeting a specific individual or group within a company
Whaling
Spear Phishing the CEO/CFO of a company
Impersonation
Pretending to be someone else to gain information
Eliciting Information
Extracting information from a victim
Dumpster Diving
Diving in the dumpster…. literally.
Shoulder Surfing
Gathering information from afar, such as webcam monitoring, looking at the info through a mirror, binoculars/telescopes, etc.
Tailgating
Following someone into a restricted area
Hoax
A threat that doesn’t actually exist
Watering Hole Attack
A web server has been compromised and is being used to target web traffic in order to deploy malware or collect data.
SPAM
Unsolicited messages from texts, email, forums, etc.
Unsolicited email, Trackback, negative SEO attacks, spiders, and malware warnings