Chapter 8: Social Engineering and Attacks Flashcards
two types active and passive; passive is where the attacker researches your company and collect information that will be used at a later stage. Active is where the attacker interacts with the user or their desktop—someone has your username and tries to reset the password
Reconnaissance
campaigns are a social engineering attack to influence people form countries all over the world—two types: social media and hybrid warfare
Influence Campaigns
carried out by state actors to influence the balance of power in a country using military political economic or civil means
Hybrid warfare
when someone removes the trash from your trash in hopes of finding a letter that holds PII that can be used to commit fraud.
Dumpster Diving
involves a person standing behind someone who is using a computer so that they can see sensitive information
Shoulder surfing
companies in the same industry visit similar websites. Therefore, attackers identify a website that people in a particular industry are likely to visit and then infect with a virus.
Watering Hole Attack
this is a DNS redirection attack where either the DNS cache has been poisoned or an entry is placed in your hosts file. The victim is redirected to a fraudulent website.
Pharming
Types of Social Engineering
Authority: email may be sent out by someone of a higher authority ordering you to complete a form that can be accessed by clicking a link.
Intimidation: someone pretending to be someone of high authority. They then threaten an individual telling them they are in trouble if don’t do what they are told.
Urgency: someone arriving at a reception desk and demanding access quickly.
Scarcity: panic to make a snap decision. “Only one room left”
Familiarity and Trust: hackers make themselves familiar to their victims; they come around a lot bringing them boxes of chocolates and eventually they become trusted
Consensus: people like to be accepted by peers and coworkers. An attacker might ask for some information and state that they obtained it last week from a coworker and need an update on it.
has no information because they are not authorized by the company
-hacker
Black Hat
is provided with limited information from the company because may be participating in the bug bounty program-may be known as ethical hackers
Gray Hat
is an ethical hacker who is employed by the company to test applications for flaws and vulnerabilities.
White Hat
external threat actor who defaces your website or breaks into your computer or network. They are politically motivated and seek social change.
Hactivists
this is where people plug their own computers and devices into your network without your consent.
Shadow IT
person who does not have expert technical knowledge and uses script and code that they find to launch an attack on your company
Script Kiddie
another country that poses a threat to your country
State Actors
external threat that tries to steal data from your network but they are there for an extremely long period of time. They are well organized well funded and sophisticated
Advanced Persistent Threat (APT)
Target mainly to steal money
Criminal Syndicates
disgruntled employee that may have been overlooked for promotion and relationship with company has gone sour.
Insider Threat
start by using all the words in the oxford English Dictionary and use them to try and crack passwords, but misspelled names or passwords with special characters cant be cracked.
-could crack elasticity but not el@sticity
Dictionary Attacks
runs though all the different combinations of letters and characters and will eventually crack a given password. The length of the password may slow down such an attack, but will eventually be cracked.
Brute Force Attacks
is a combination of both a dictionary and a brute force attack
Hybrid Attack
password spraying uses the most common password in a type of reverse brute force attack. The hacker first searches the internet for people who work within an organization and see whether they can work out the standard naming convention.
Spraying Attack
this is where an attacker navigates through a structure of a web server moving from page to page searching for login details. It is known to use …/ to navigate through the directory structure.
Directory Traversal
can also be called “skimming” where a credit card has been put through a card cloning machine. The most common places for these devices are ATMs or when you pay a bill at a restaurant
Card Cloning