Domain #1 Flashcards
Domain #1 Attacks, Threats, & Vulnerabilities
What is Phishing?
A form of social engineering in which an attacker asks someone for a piece of information they are missing by making it look like it is a legitimate request from a trusted source. Commonly sent
via email.
Signs of Phishing?
- Misspelling in the URL
- Usually there’s something copied incorrectly
- Spelling
- Fonts
- Graphics
What is Typo squatting?
Domain created based on the misspelling of another.
What is Pretexting?
An attacker lies to get information. Pretends to be someone else to persuade another person to give up their information.
How do attackers use Pretexting to gain information?
They use a popular brand or service name to lure you into clicking a link/ providing information.
What is Pharming?
- Combines phishing + pharming.
- An attacker attacks a group of people.
- Uses malicious code on compromised systems to send
unsuspecting users to malicious websites.
What is Vishing?
Phishing done over the phone.
Users Voice Over IP (VoIP)–> Technology that allows people to make voice calls using internet connection instead of a phone line.
Characteristics of Vishing?
- Done over the phone
- Caller ID spoofing
What is Smishing?
A phishing technique that uses phishing via SMS (text) messages and vishing or phishing via telephone.
What are the characteristics of Smishing?
- Done by text messages
- Spoofing
- Forwards links + asks for personal info
How do attackers know where to Phish?
- Reonnaissance: Gather info on the victim
- Background info
- Social Media
- Corporate Websites
- 3rd Party Websites
What is Spear Phishing?
- Targeted Phishing with inside information
- Phishing aimed at specific individuals or groups
What is Whaling?
- Type of Spear Phishing
- Phishing aimed at senior staff and organizational leadership or other high-profile targets.
What is Impersonation?
Pretending to be another to gain information.
How do attackers use impersonation?
Attackers use details from their reconn. to establish trust & credibility from their victims
Attackers may also use high ranking job titles to urge victims to give information