Phishing Flashcards

1
Q

Phishing

A

Pretends to be from a trusted source

Check address, will have different URL

Something usually isn’t “quite right”

To avoid type URL of site directly into browser; don’t click from an email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Typosquatting

A

Using URL that is slightly different or misspelled.

Example:
professormessor.com instead of the correct professormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prepending

A

Adding an additional character to the beginning of the email to make it seem like a legitimate email.

Example:
pprofessormesser.com instead of professormesser.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting

A

Lying to get information.
Acting like a well known company ie; Amazon, Netflix, Visa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

Redirects legitimate site to a bogus site.

Does this by using a poisoned server or client vulnerability.P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming with Phishing

A

Pharming redirects users to illegitimate site from an actual site.

Phishing takes those users and collects their data.

Difficult for anti-malware to detect because original site may be legitimated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vishing

A

Using voicemail to phish.

Caller ID is spoofed appearing local.
Usually in the form of fake security checks or bank updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smishing (Short Message Services of SMS Phishing)

A

Done by text.
Forwards links.
Asks for personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Variations of Phishing

A

Fake check scam.
Phone verification code scam.
Boss/CEO scam
List of scams on Reddit.com/r/scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reconnaissance

A

To gather information on a victim or target.
Gather through:
- Lead generation sites.
- LinkedIn, Twitter, Facebook, Instagram, etc.

Attacker builds credible pretext:
-Where you work.
-Where you bank.
-Recent financial transactions.
-Family and friends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spear Phishing

A

Directed phishing.
Going after a specific person.

Whaling is a form where you go after a high-level person:
- CEO
-CFO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly