1.1 Social Engineering Techniques Flashcards

1
Q

Phishing

A

Attackers fish for victims using bait. The goal is to manipulate individuals into taking action they otherwise wouldn’t through the use of fraudulent communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A

Type of phishing attack occurring through text messages or other messaging services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A

Type of phishing attack over the phone to trick users into divulging sensitive information or taking certain actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

Refers to unsolicited and often irrelevant or inappropriate messages sent over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPIM

A

Referring to unwanted and unsolicited messages sent over instant messaging platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

A targeted form of fishing attack in which cybercriminal is tailor their fraudulent messages to a specific individual organization or group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster Diving

A

Refer to the unauthorized retrieval of sensitive information such as documents containing personal or confidential data from discarded materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder Surfing

A

Is a form of visual hacking where an individual observes or spies on someone’s else sensitive or confidential information by looking over their shoulder often and crowded or public places.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

A cyber attack that involves the manipulation of the DNS or other methods to redirect users to fraudulent websites. The goal of farming is to deceive users into visiting malicious websites that appear to be legitimate with the intention of stealing sensitive information such as login credentials, personal details, or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating/Piggybacking

A

Referring to an unauthorized person following an authorized individual into a secure area without proper authentication taking advantage of someone else’s legitimate access taking Android to a restricted or secure location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting Information

A

Refers to the active skillfully obtaining a drawing out information from individuals through various communication techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A

Refers to a highly targeted form of fishing attack that specifically targets high profile individuals within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Perpending

A

The technique where malicious characters or code are added at the beginning of a legitimate file string or command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity Fraud/Theft

A

Any type of crime in which an individual’s personal information is stolen and used without their permission for fraudulent activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice Scams/Billing Scams/Payment Scams

A

Are fraudulent schemes in which individuals or businesses receive fake or misleading voices with the goal of tricking them into making payments for goods or services that were never provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential Harvesting/Phising

A

A cyber attack technique where attackers attempt to trick individuals into providing their usernames passwords or other sensitive information.

17
Q

Passive Reconnaissance

A

Collecting information without directly interacting with the target. This information can include publicly available data such as domain registration details, public records, social media profiles, and websites.

18
Q

Active Reconnaissance

A

Involves more directive direction with a target such as network scanning. Discipline include using tools to discover active hosts, open ports, and services running on a network.

19
Q

OSINT/Open Source Intelligence

A

Refers to the process of collecting and analyzing publicly available information from various sources to gain inside intelligence. These sources of information include public websites, government publications, academic publications, and online directories.

20
Q

Enumeration

A

Involves gathering more detailed information about the target system such as user accounts, network shares, and system configurations.

21
Q

Vulnerability Scanning

A

Actively searching for vulnerabilities in systems, applications, or network configurations to identify potential points of exploitation.

22
Q

Hoax

A

A deliberately fabricated or misleading piece of information intended to deceive or trick individuals or the public. Hoaxes can include written or spoken communication, images, videos, or other media.

23
Q

Impersonation

A

They act of pretending to be someone else often with the intent to deceive manipulate or gain unauthorized access to information, resources, or privileges.

24
Q

Watering Hole Attack

A

A type of cyber attack in which the attacker compromises a website that is likely to be visited by the targeted individuals or groups.

25
Q

Typosquatting/URL Hijacking

A

A cyber attack technique in which malicious actors registered domain names that closely resemble legitimate well-known websites. The intent is to take advantage of user typos or mistakes when entering a website’s URL.

26
Q

Pretexting

A

Hey social engineering technique in which an attacker creates a fabricated scenario or pretext to manipulate individuals into divulging sensitive information such as personal details account credentials or other credential data. The goal is to gain the trust of the target by posing as someone else or creating false narratives.

27
Q

Influence Campaigns/Information Operations/Propaganda Efforts

A

Coordinated efforts to shape perception beliefs and behaviors of individuals or groups, often with the goal of advancing a particular agenda, influencing public opinion, or achieving specific political, social, or economic objectives.

28
Q

Hybrid Warfare

A

A military strategy that blends conventional warfare irregular warfare and unconventional tactics to achieve strategic objectives. It is also characterized by its use of diverse and asymmetric means to achieve strategic goals often blurring the lines between traditional military conflict and other forms of aggression. A form of influence campaign.

29
Q

Social Media

A

A powerful platform for conducting influence campaigns due to its widespread reach, accessibility, and the ability to target specific demographics.

30
Q

Principles (Reasons For Effectiveness) Authority

A

The attacks can ensure that the authority is taken from the user and the attacker gets into his hands. In some cases it may happen that the authority isn’t snatched from the user and the attacker simply borrows it until he is done transferring the data or money.

31
Q

Principles (Reasons for Effectiveness) Intimidation

A

There are several intimidation levels involved. Like Indian impersonators case, The attack is done by someone while making one believe that the attacker is good and authentic person hence some trust is developed. Same as done in the case with phishing where the fake website is created similar to the original one so one can get deceived easily.

32
Q

Principles (Reasons For Effectiveness) Consensus/Social proof

A

One might not be able to find any social proof that who has done the attack and where the whole data is gone. Hence one can easily steal the data without leaving any social trace.

33
Q

Principles (Reasons For Effectiveness) Scarcity

A

Some of the attacks, like virus hoax, are not that common so people don’t know about it. Hence they don’t prepare themselves for such a tax and there are so many people out there who don’t even know what fishing attacks are. Inadequacy of knowledge is what leads the hackers into their files and hence the result of data laws.

34
Q

Principles (Reasons For Effectiveness) Urgency

A

The process of the hacking done in these cases is quick. There are many attacks which lured the people in by telling some offers which would end soon and hence the user’s fall into the trap of urgency and don’t even think about the minor changes in which can save them from being deceived.

35
Q

Principles (Reasons For Effectiveness) Familiarity / Liking

A

Another important factor here which can help someone getting away from it is getting familiarity. If one is being attacked and he doesn’t even realize it’s an attack since he isn’t familiar with the terms and the methods then he can surely get trapped and lose his data to hackers.

36
Q

Principles (Reasons For Effectiveness) Trust

A

There was something bad about the attacks which is that they sometimes betray some trust. Like in fishing they act as if the website shown is the real one and one might not even find any difference. In the case of a hoax the warnings come and go but one would think that they are normal.