Exploiting Physical and Social Vulnerabilities Flashcards

1
Q

Cynthia wants to use a phishing attack to acquire credentials belonging to the senior leadership of her target. What type of phishing attack should she use?

a. Smishing
b. VIPhishing
c. Whaling
d. Spear phishing

A

c. Whaling is a specialized form of phishing that targets important leaders and senior staff. If Cynthia was specifically targeting individuals, it would be spear phishing. Smishing uses SMS messages, and VIPhishing was made up for this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mike wants to enter an organization’s high-security data center. Which of the following techniques is most likely to stop his tailgating attempt?

a. Security cameras
b. A security vestibule
c. An egress sensor
d. An RFID badge reader

A

b. A security vestibule allows only one individual through at a time, with doors at either end that unlock and open one at a time. It will prevent most piggybacking or tailgating behavior unless employees are willfully negligent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following technologies is most resistant to badge cloning attacks if implemented properly?

a. Low-frequency RFID
b. Magstripes
c. Medium-frequency RFID
d. Smartcards

A

d. Most organizations continue to use RFID or magnetic stripe technology for entry access cards, making a penetration tester’s job easier, since both technologies can be cloned. Smart cards are far more difficult to clone if implemented properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely. Jen wants to send a phishing message to employees at the company. She wants to learn the user IDs of various targets in the company and decides to call them using a spoofed VoIP phone number similar to those used inside the company. Once she reaches her targets, she pretends to be an administrative assistant working with one of Flamingo’s senior executives and asks her targets for their email account information. What type of social engineering is this?

a. Impersonation
b. Interrogation
c. Shoulder surfing
d. Administrivia

A

a. Jen is impersonating an administrative assistant. Interrogation techniques are more aggressive and run the risk of making the target defensive or aware they are being interrogated. Shoulder surfing is the process of looking over a person’s shoulder to acquire information and administrivia isn’t a penetration testing term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely. Jen wants to deploy a malicious website as part of her penetration testing attempt so that she can exploit browsers belonging to employees. What framework is best suited to this?

a. Metasploit
b. BeEF
c. SET
d. OWASP

A

b. The Browser Exploitation Framework, or BeEF, is specifically designed for this type of attack. Jen can use it to easily deploy browser exploit tools to a malicious website and can then use various phishing and social engineering techniqes to get Flamingo employees to visit the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jen has been contracted to perform a penetration test against Flamingo, Inc. As part of her penetration test, she has been asked to conduct a phishing campaign and to use the results of that campaign to gain access to Flamingo systems and networks. The scope of the penetration test does not include a physical penetration test, so Jen must work entirely remotely. After attempting to lure employees at Flamingo, Inc. to fall for a phishing campaign, Jen finds that she hasn’t acquired any useful credentials. She decides to try a USB key drop. Which of the following Social-Engineer Toolkit modules should she select to help her succeed?

a. The website attack vectors module
b. The Infectious Media Generator
c. The Mass Mailer Module
d. The Teensy USB HID attack module

A

b. Jen should use the infectious media generator tool, which is designed to create thumb drives and other media that can dropped on-site for employees to pick up. The Teensy USB HID attack module may be a tempting answer, but it is designed to make a Teensy (a tiny computer much like an Arduino) act like a keyboard or other human interface device rather than to create infected media. Creating a website attack or a mass mailer attack isn’t part of a USB key drop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Chris sends a phishing email specifically to Susan, the CEO at his target company. What type of phishing attack is he conducting?

a. CEO baiting
b. Spear phishing
c. Phish hooking
d. Hook SETing

A

b. Chris is conducting a spear phishing attack. Spear phishing attacks target specific individuals If Chris was targeting a group of important individuals, this might be a whaling attack instead. CEO baiting, phish hooking and Hook SETing were all made up for this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Frank receives a message to his cell phone from a phone number that appears to be from the IRS. When he answers, the caller tells him that he has past due taxes and is in legal trouble. What type of social engineering attack has Frank encountered?

a. A spear phishing attack
b. A whaling attack
c. A vishing attack
d. A SMS phishing attack

A

c. Frank has encountered a vishing attack, a type of attack conducted via phone that often relies on a perception of authority and urgency to acquire information from its targets. A spear phishing attack targets specific individuals or groups, and whaling attacks are aimed at VIPs, neither of which are indicated in the question. The attack is via voice, not SMS, ruling that answer out too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Emily wants to gather information about an organization but does not want to enter the building. What physical data gathering technique can she use to potentially gather business documents without entering the building?

a. Piggybacking
b. File surfing
c. USB drops
d. Dumpster diving

A

d. Emily can try dumpster diving. An organization’s trash can be a treasure trove of information about the organization, its staff, and its current operations based on the documents and files that are thrown away. She might even discover entire PCs or discarded median.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cameron sends a phishing email to all of the administrative assistants in a company. What type of phishing attack is he conducting?

a. Whaling
b. Vishing
c. A watering hole attack
d. Spear phishing

A

d. Spear phishing is targeted to specific populations, in this case, administrative assistants. Whaling targets VIPs, vishing is done via phone calls, and a watering hole attack leverages a frequently visited site or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which social engineering motivation technique relies on persuading the target that other people have behaved similarly and thus that they could too?

a. Likeness
b. Fear
c. Social proof
d. Reciprocation

A

c. Social proof relies on persuading an individual that they can behave in a way similar to what they believe others have. A social proof scenario might involve explaining to the target that sharing passwords was commonly done among employees in a specific circumstance or that it was common practice to let other staff in through a secure door without an ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Megan wants to clone an ID badge for the company that she is performing a penetration test against. Which of the following types of badge can be cloned without even touching it?

a. Magstripe
b. Smartcard
c. RFID
d. CAC

A

c. RFID badges are wireless and can sometimes be cloned from distances up to a few feet away. Magstripe cards need to be read with a magnetic stripe reader. smartcards provide additional security that make them difficult to clone, and CAC cards are the U.S. government’s smartcard implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Allan wants to gain access to a target company’s premises but discovers that his original idea of jumping the fence probably isn’t practical. His new plan is to pretend to be a delivery person with a box that requires a personal signature from an employee. What technique is he using?

a. Authority
b. Pretexting
c. Social proof
d. Likeness

A

b. Allan is using a pretext to gain access to the organization. Claiming to be a delivery person who needs a specific signature may get him past the initial security for the organization. He is not claiming particular authority, providing social proof that others allow him in, or claiming he is similar to the security person or receptionist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Charles sends a phishing email to a target organization and includes the line “Only five respondents will receive a cash prize.” Which social engineering motivation strategy is he using?

a. Scarcity
b. Social proof
c. Fear
d. Authority

A

a. Scarcity can be a powerful motivator when performing a social engineering attempt. The email that Charles sent will use the limited number of cash prizes to motivate respondents. If he had added “the first five,” he would have also targeted urgency, which is often paired with scarcity to provide additional motivation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What occurs during a quid pro quo social engineering attempt?

a. The target is offered money
b. The target is asked for money
c. The target is made to feel indebted
d. The penetration tester is made to feel indebted

A

c. A quid pro quo attempt relies on the social engineer offering something of perceived value so that the target will feel indebted to hem. The target is then asked to perform an action or otherwise do what the penetration tester wants them to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Andrew knows that the employees at his target company frequently visit a football discussion site popular in the local area. As part of his penetration testing, he successfully places malware on the site and takes over multiple PCs belonging to employees. What type of attack has he used?

a. A PWNie attack
b. A watercooler attack
c. A clone attack
d. A watering hole attack

A

d. Andrew has used a watering hole attack, but he has also made what might be a critical mistake. Placing malware on a third-party site accessed by many in the local area (or beyond) is probably beyond the scope of his engagement and is likely illegal. A better plan would have been to target a resource owned and operated by the company itself and accessed only by internal staff members.

17
Q

Steve inadvertently sets off an alarm and is discovered by a security guard during an on-site penetration test. What should his first response be?

a. Call the police
b. Attempt to escape
c. Provide his pretext
d. Call his organizational contact

A

c. Once a penetration tester is caught, their first response should be to provide their pretext. A successful social engineering attempt at this point can salvage the penetration test attempt. If that doesn’t work, calling the organizational contact for a “get out of jail free” response may be the only option in a difficult situation

18
Q

A USB key drop is an example of what type of technique?

a. Physical honeypot
b. A humanitarian exploit
c. Reverse dumpster diving
d. A hybrid attack

A

a. USB key drops are sometimes referred to as physical honeypots. They tempt staff to plug unknown devices into their computers, which a well-trained and suspicious staff shouldn’t do. The remaining options were made up for this question.

19
Q

Susan calls staff at the company she has been contracted to conduct a phishing campaign against, focusing on individuals in the finance department. Over a few days, she persuades and employee to send a wire transfer to an account she has set up after telling the employee that she has let their boss know how talented they are. What motivation technique has she used?

a. Urgency
b. Reciprocation
c. Authority
d. Fear

A

b. Susan is using the concept of reciprocation to persuae the employee that they should perform an action that benefits her, since she has done them a favor.

20
Q

Alexa carefully pays attention to an employee as they type in their entry code to her target organization’s high-security area and writes down the code that she observes. What type of attack has she conducted?

a. A Setec Astronomy attack
b. Code surveillance
c. Shoulder surfing
d. Keypad capture

A

c. Shoulder surfing takes many forms, including watching as an employee types in an entry access code. Setec Astronomy is a reference to the excellent hacking movie Sneakers, and both code surveillance and keypad capture were made up for this question