DOMAIN 1 Flashcards
SOCIAL ENGINEERING
an attempt by an attacker to convince someone to provide info (like a password) or
perform an action they wouldn’t normally perform (such as clicking on a malicious link).
PHISHING
commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachment.
SPEAR PHISHING
targets specific groups of users
WHALING
targets high level executives
VISHING
(voice phishing) phone based
SMISHING
uses SMS (text) messaging on mobile
SPAM
Unsolicited email, generally
considered an irritant
SPIM
SPAM over instant messaging, also
generally considered an irritant
DUMPSTER DIVING
Gathering important details (intelligence) from
things that people have thrown out in their trash.
TAILGATING
when an unauthorized individual might
follow you in through that open door
without badging in themselves.
ELICITING INFORMATION
strategic use of casual conversation
to extract information without the
arousing suspicion of the target
SHOULDER SURFING
a criminal practice where thieves
steal your personal data by spying
over your shoulder
PHARMING
an online scam
similar to phishing, where
a website’s traffic is manipulated, and
confidential information is stolen.
IDENTITY FRAUD
use of another person’s
personal information,
without authorization, to commit a crime or to
deceive or defraud that person or other 3rd party.
PREPENDING
Prepending is adding words or phrases like “SAFE”
to a malicious file or suggesting topics via social
engineering to uncover information of interest.
INVOICE SCAMS
fake invoices with a goal of receiving money or
by prompting a victim to put their credentials
into a fake login screen.
CREDENTIAL HARVESTING
attackers trying to gain access to your
usernames and passwords that might be
stored on your local computer.
PASIVE DISCOVERY
Techniques that DO NOT send packets to the target; like Google hacking, phone
calls, DNS and WHOIS lookups.
SEMI-PASSIVE DISCOVERY
Touches the target with packets in a non
aggressive fashion to avoid raising
alarms of the target.
ACTIVE DISCOVERY
More aggressive techniques likely to be noticed by the target, including port
scanning, and tools like nmap and Metaspoit.
HOAXES
Intentional falsehoods coming in a variety of forms ranging from virus
hoaxes to fake news. Social media plays a prominent role in hoaxes today.
IMPERSONATION
A form of fraud in which attackers pose as a known or trusted person to
dupe the user into sharing sensitive info, transferring money, etc.
WATERING HOLE ATTACK
Attack strategy in which an attacker guesses or observes which websites an
organization often uses and infects one or more of them with malware.
TYPOSQUATTING
aka “URL hijacking”
a form of cybersquatting (sitting on
sites under someone else’s brand or
copyright) targeting users who type
an incorrect website address
PRESTEXTING
An attacker tries to convince a victim to give up
information of value, or access to a service or system. The attacker develops a story, or pretext, in order to fool the victim.
INFLUENCE CAMPAIGNS
A social engineering attack intended to manipulate
the thoughts and minds of large groups of people.
HYBRID WARFARE
Attack using a mixture of conventional and unconventional
methods and resources to carry out the campaign. Including:
- SOCIAL MEDIA: May use multiple social platforms leveraging multiple/many
individuals to amplify the message, influencing credibility.
May involve creating multiple fake accounts to post content and
seed the spread. And may even include paid advertising.
PRINCIPLES OF SOCIAL ENGINEERING
- Authority
- Intimidation
- Consensus
- Scarcity
- Familiarity aka “liking”
- Trust
- Urgency
APPLICATION ATTACKS
attacks attackers use to exploit
poorly written software .
ROOTKIT (escalation of privilege)
freely available on the internet and exploit known vulnerabilities in various
operating systems enabling attackers to elevate privilege.
Countermeasures: keep security patches up
to date
anti
malware software, EDR/XDR
BACK DOOR
undocumented command sequences that allow individuals with knowledge
of the back door to bypass normal access restrictions.
often used in development and debugging.
Countermeasures: firewalls, anti
malware, network monitoring, code review.
COMPUTER VIRUS
a type of malicious code or program written to
alter the way a computer operates and is designed
to spread from one computer to another.