4A: Exploit the Human Psyche Flashcards
3.6 Given a scenario, perform a social engineering or physical attack.
A social engineering tactic where a team will communicate, whether directly or indirectly, a lie or half-truth in order to get someone to believe a falsehood.
Pretexting
Acquiring data from a target in order to launch an attack.
Elicitation
An impersonation attack in which the attacker gains control of an employee’s account and uses it to convince other employees to perform fraudulent actions.
Business Email Compromise (BEC)
A malicious communication that tricks the user into performing undesired actions, such as deleting important system files in an attempt to remove a virus, or sending money or important information.
Hoax
Email-based social engineering attack in which the attacker sends email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim.
Phishing
A set of tools included in Kali Linux. This tool has built-in features to help you launch a phishing campaign, create a malicious payload, such as a virus, worm, or Trojan, and embed the payload in a PDF.
Social Engineers Toolkit (SET)
An impersonation attack in which a request for a website, typically an e-commerce site, is redirected to a similar-looking, but fake, website.
Pharming
A form of social engineering in which an attacker leaves infected physical media in an area where a victim finds it and then inserts it into a computer.
Baiting
An email-based or web-based form of phishing which targets specific individuals.
Spear Phishing
An attack in which an attacker targets specific groups or organizations, discovers which websites they frequent, and injects malicious code into those sites.
Watering Hole Attack
An attack that targets the end-to-end process of manufacturing, distributing, and handling goods and services.
Supply Chain Attack
Occurs when malware on a target organization harms an associated (downstream) vendor. At that point the target organization is liable for any damage.
Downstream Liability
An attack—also called typosquatting—in which an attacker registers a domain name with a common misspelling of an existing domain, so that a user who misspells a URL they enter into a browser is taken to the attacker’s website.
URL Hijacking
Social engineering attack where an attacker pretends to be someone they are not.
Impersonation