Chapter 4 - Social Engineering and Password Attacks Flashcards

1
Q

Social Engineering

A

Social engineering is the practice of manipulating people through a variety of strategies to accomplish desired actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the most common principles that are leveraged to successfully social engineer an individual?

A
  1. Authority: Most people will obey someone who appears to be in charge or knowledgeable (manager, government official, etc.)
  2. Intimidation: Scaring or bullying an individual into taking a desired action (threatening that one will lose their job).
  3. Consensus-based/Social Proof: Lying and saying that everyone else in a department had already taken an action.
  4. Scarcity: Make something look more desirable by making it seem like the last one available.
  5. Familiarity: These attacks rely on the target liking the individual or organization that the attacker is claiming to represent.
  6. Urgency: Creating a feeling that the action must be taken quickly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Phishing involves sending fraudulent communications that appear to come from a legitimate source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Whaling

A

Whaling is phishing that is targeted at senior employees (CEOs, CFOs, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vishing

A

Vishing is phishing accomplished via voice or voicemail messages. Common Vishing scams include requests to help a relative or friend in another country, various tax scams, threats of law enforcement action and requests for a staff member to perform a task for a senior executive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smishing

A

Smishing relies on text messages as part of the phishing scam. Smishing scams frequently attempt to get users to click on a link in a text message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Misinformation

A

Misinformation is incorrect information, often resulting from getting facts wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disinformation

A

Disinformation is incorrect, inaccurate, or outright false information that is intentionally provided to serve an individual or organization’s goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Impersonation

A

Impersonation is pretending to be someone else (either a specific person or simply a member of some organization).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Email Compromise

A

Business Email Compromise relies on using apparently legitimate email addresses to conduct scams and other attacks. Some common methods for creating emails that appear legitimate include:

  1. Using compromised accounts
  2. Sending spoofed emails
  3. Using common fake but similar domain techniques
  4. Using malware or other tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pretexting

A

Pretexting is the process of using a made-up scenario to justify why you are approaching an individual. This can often be defeated by asking the attacker questions or requiring verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watering Hole Attacks

A

Watering Hole Attacks use websites that targets frequent to attack them. Attackers compromise the frequently visited site and use the site to deploy malware to end-user machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brand Impersonation

A

Brand Impersonation attacks use emails that are intended to appear to be from a legitimate brand, relying on name recognition or even using email templates used by the brand itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Typosquatting

A

Typosquatting attacks use misspelled and slightly off but similar to the legitimate site URLs to conduct Typosquatting attacks. These attacks rely on the fact that some people will mistype URLs and end up on their sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pharming

A

Pharming, similar to typosquatting, relies either on changing a system’s hosts file or on malware that will change the system’s DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute-force attacks

A

Brute-force attacks iterate through passwords until they find one that works. These attacks can vary in sophistication, making use of common passwords or password complexity rules.

17
Q

Password Spraying attacks

A

Password spraying attacks are a form of brute-force attack that attempts to use a single password or small set of passwords against many accounts.

18
Q

Dictionary attacks

A

Another form of brute-force attack, dictionary attacks use a list of words for their password attempts.

19
Q

Rainbow tables

A

Rainbow tables are an easily searchable database of precomputed hashes using the same hashing methodology as the captured password file.