4A Compare and Contrast Social Engineering Techniques Flashcards
Describe the Familiarity/Liking principal
The ability to be affable and likable and to be able to persuade other people to do something for you
Describe the Consensus/Social Proof Principle
Refers to the fact that without an explicit instruction to behave in a certain way, many people will act just as they think others would act
Describe the Authority and Intimidation
Impersonating someone of higher authority
Describe the Scarcity and Urgency Principle
Using a sense of emergency to get someone to do something
What is impersonation?
simply means pretending to be someone else. It is one of the basic social engineering techniques. Impersonation can use either a consensus/liking or intimidating approach. Impersonation is possible where the target cannot verify the attacker’s identity easily, such as over the phone or via an email message.
What is dumpster diving?
refers to combing through an organization’s (or individual’s) garbage to try to find useful documents (or even files stored on discarded removable media).
What is Tailgating?
a means of entering a secure area without authorization by following close behind the person that has been allowed to open the door or checkpoint
What is piggy backing?
A similar situation, but means that the attacker enters a secure area with an employee’s permission, For instance, an attacker might impersonate a member of the cleaning crew and request that an employee hold the door open while they bring in a cleaning cart or mop bucket.
What is Identity fraud?
a specific type of impersonation where the attacker uses specific details of someone’s identity
What is shoulder serving?
When a threat actor obtains info by watching someone input passwords or pins on a computer
What is a Lunchtime attack?
a user leaves a workstation unattended while logged on, an attacker can physically gain access to the system
What is Phishing?
a combination of social engineering and spoofing. It persuades or tricks the target into interacting with a malicious resource disguised as a trusted one, traditionally using email as the vector
What is spear phishing?
a phishing scam where the attacker has some information that makes an individual target more likely to be fooled by the attack. Each phishing message is tailored to address a specific target user
What is whaling?
a spear phishing attack directed specifically against upper levels of management in the organization (CEOs and other “big fish”). Upper management may also be more vulnerable to ordinary phishing attacks because of their reluctance to learn basic security procedures
What is Vishing?
a phishing attack conducted through a voice channel (telephone or VoIP, for instance). For example, targets could be called by someone purporting to represent their bank asking them to verify a recent credit card transaction and requesting their security details.
What is SMiShing?
refers to using short message service (SMS) text communications as the vector
What are Hoaxes?
An email alert or web pop-up will claim to have identified some sort of security problem, such as virus infection, and offer a tool to fix the problem. The tool of course will be some sort of Trojan application
What is prepending?
adding text that appears to have been generated by the mail system
What is Pharming?
a passive means of redirecting users from a legitimate website to a malicious one. Rather than using social engineering techniques to trick the user, pharming relies on corrupting the way the victim’s computer performs Internet name resolution, so that they are redirected from the genuine site to the malicious one
What is Typosquatting?
the threat actor registers a domain name that is very similar to a real one, such as connptia.org, hoping that users will not notice the difference. These are also referred to as cousin, lookalike, or doppelganger domains.
What is a Watering Hole Attack?
the threat actor does not have to risk communicating directly with the target. It relies on the circumstance that a group of targets may use an unsecure third-party website.
What is Credential Harvesting?
a campaign specifically designed to steal account credentials. The attacker may have more interest in selling the database of captured logins than trying to exploit them directly
What is a Influence campaign?
a major program launched by an adversary with a high level of capability, to shift public opinion on some topic
What is a Virus/worms?
the first types of malware and spread without any authorization from the user by being concealed within the executable code of another process.