Reconnaissance Flashcards
When an attacker goes through trash to find sensitive information.
Dumpster Diving
When an attacker stands near or behind victim while they are on their computer.
Shoulder Surfing
A threat created by the attacker to overwhelm the victim so they willingly give over sensitive information.
Hoaxes
When an attacker infects a third-party site to infect computers within your organization.
Watering Hole Attack
Unsolciaited messages in email, text messages or web-browsers
Spam
When an attacker tries to sway public opinion on social media.
Influence Campaigns
When an attacker enters an unauthroized location by following someone else.
Tailgating
When an attacker sends a fake bill to a business.
Invoice Scam
An attacker extracts credentials from an application like Chrome.
Credential Harvesting
A social engineering technique where an attacker impersonates someone higher ranking than you.
Appeal to Authority
A social engineering technique where an attacker warns that if the information they are requesting is not received, something bad will happen.
Intimidation
A social engineering technique where an attacker says someone else performs this task all the time for them.
Consenus
A social engineering technique where an attacker makes their requests seem time or resource sensitive.
Scarcity
A social engineering technique where an attacker makes their requests seem just time sensitive.
Urgency