4A Compare and Contrast Social Engineering Techniques Flashcards

1
Q

Describe the Familiarity/Liking principal

A

The ability to be affable and likable and to be able to persuade other people to do something for you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the Consensus/Social Proof Principle

A

Refers to the fact that without an explicit instruction to behave in a certain way, many people will act just as they think others would act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Authority and Intimidation

A

Impersonating someone of higher authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Scarcity and Urgency Principle

A

Using a sense of emergency to get someone to do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is impersonation?

A

simply means pretending to be someone else. It is one of the basic social engineering techniques. Impersonation can use either a consensus/liking or intimidating approach. Impersonation is possible where the target cannot verify the attacker’s identity easily, such as over the phone or via an email message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is dumpster diving?

A

refers to combing through an organization’s (or individual’s) garbage to try to find useful documents (or even files stored on discarded removable media).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Tailgating?

A

a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is piggy backing?

A

A similar situation, but means that the attacker enters a secure area with an employee’s permission, For instance, an attacker might impersonate a member of the cleaning crew and request that an employee hold the door open while they bring in a cleaning cart or mop bucket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Identity fraud?

A

a specific type of impersonation where the attacker uses specific details of someone’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shoulder serving?

A

When a threat actor obtains info by watching someone input passwords or pins on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Lunchtime attack?

A

a user leaves a workstation unattended while logged on, an attacker can physically gain access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phishing?

A

a combination of social engineering and spoofing. It persuades or tricks the target into interacting with a malicious resource disguised as a trusted one, traditionally using email as the vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spear phishing?

A

a phishing scam where the attacker has some information that makes an individual target more likely to be fooled by the attack. Each phishing message is tailored to address a specific target user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is whaling?

A

a spear phishing attack directed specifically against upper levels of management in the organization (CEOs and other “big fish”). Upper management may also be more vulnerable to ordinary phishing attacks because of their reluctance to learn basic security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Vishing?

A

a phishing attack conducted through a voice channel (telephone or VoIP, for instance). For example, targets could be called by someone purporting to represent their bank asking them to verify a recent credit card transaction and requesting their security details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SMiShing?

A

refers to using short message service (SMS) text communications as the vector

17
Q

What are Hoaxes?

A

An email alert or web pop-up will claim to have identified some sort of security problem, such as virus infection, and offer a tool to fix the problem. The tool of course will be some sort of Trojan application

18
Q

What is prepending?

A

adding text that appears to have been generated by the mail system

19
Q

What is Pharming?

A

a passive means of redirecting users from a legitimate website to a malicious one. Rather than using social engineering techniques to trick the user, pharming relies on corrupting the way the victim’s computer performs Internet name resolution, so that they are redirected from the genuine site to the malicious one

20
Q

What is Typosquatting?

A

the threat actor registers a domain name that is very similar to a real one, such as connptia.org, hoping that users will not notice the difference. These are also referred to as cousin, lookalike, or doppelganger domains.

21
Q

What is a Watering Hole Attack?

A

the threat actor does not have to risk communicating directly with the target. It relies on the circumstance that a group of targets may use an unsecure third-party website.

22
Q

What is Credential Harvesting?

A

a campaign specifically designed to steal account credentials. The attacker may have more interest in selling the database of captured logins than trying to exploit them directly

23
Q

What is a Influence campaign?

A

a major program launched by an adversary with a high level of capability, to shift public opinion on some topic

24
Q

What is a Virus/worms?

A

the first types of malware and spread without any authorization from the user by being concealed within the executable code of another process.

25
Q

What is a trojan?

A

malware concealed within an installer package for software that appears to be legitimate. This type of malware does not seek any type of consent for installation and is actively designed to operate secretly.

26
Q

What is a Potentially unwanted programs (PUPs)/Potentially unwanted applications (PUAs)?

A

software installed alongside a package selected by the user or perhaps bundled with a new computer system

27
Q

Describe a Non-resident/file infector

A

the virus is contained within a host executable file and runs with the host process. The virus will try to infect other process images on persistent storage and perform other payload actions. It then passes control back to the host program.

28
Q

Describe a Memory resident virus

A

when the host file is executed, the virus creates a new process for itself in memory. The malicious process remains in memory, even if the host process is terminated.

29
Q

What is a boot virus?

A

the virus code is written to the disk boot sector or the partition table of a fixed disk or USB media, and executes as a memory resident process when the OS starts or the media is attached to the computer.

30
Q

What is a Script and macro viruses?

A

the malware uses the programming features available in local scripting engines for the OS and/or browser, such as PowerShell, Windows Management Instrumentation (WMI), JavaScript, Microsoft Office documents with Visual Basic for Applications (VBA) code enabled, or PDF documents with JavaScript enabled.

31
Q

What are cookies?

A

A cookie is a plaintext file, not malware, but if permitted by browser settings, third-party cookies can be used to record pages visited, the user’s IP address and various other metadata, such as search queries and information about the browser software.

32
Q

What is adware?

A

a class of PUP/grayware that performs browser reconfigurations, such as allowing tracking cookies, changing default search providers, opening sponsor’s pages at startup, adding bookmarks, and so on. Adware may be installed as a program or as a browser extension/plug-in

33
Q

What is a bot?

A

an automated script or tool that performs some malicious activity.

34
Q

What is a Rootkit?

A

Malware able to execute without requiring any authorization using SYSTEM privileges

35
Q

What is Crypto-malware?

A

hijacks the resources of the host to perform cryptocurrency mining. This is referred to as crypto-mining or cryptojacking.

36
Q

What is the other type of crypto-malware?

A

class of ransomware attempts to encrypt data files on any fixed, removable, and network drives

37
Q

What is a logic bomb?

A

types of malware do not trigger automatically. Having infected a system, they wait for a pre-configured time or date (time bomb) or a system or user event

38
Q

What are some indicators of malware?

A

Antivirus Notifications
Sandbox Execution
Resource Consumption