Social Engineering Flashcards

1
Q

What is Phishing

A

Persuades or tricks target into interacting with a malicious resource. traditionally over Email. Combines social engineering and spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Smishing

A

A standard scam sent via text (SMS). Used to trick target into giving valuable info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vishing

A

Over the phone Phishing. Scam to extract info or convince target to interact with malicious resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spam

A

Unsolicited Email both malicious and mundane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SPIM (Spam over internet messaging)

A

Unsolicited messaging through internet messaging{ catch all for not email but sent over the internet}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spear Phishing

A

Focused Phishing usually including information to add credibility. Tailored to address a specific target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Dumpster Diving

A

Combing through garbage for files/removable media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Shoulder Surfing

A

Observing the input of a password or information. not just physically looking over the shoulder cameras are fair game. Recorded video counts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pharming

A

Corrupts name resolution process in order to reroute users of legitimate websites to malicious websites passively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tailgating

A

Entering an area unauthorized via following closely behind someone without their knowledge or consent of malicious goals. Still count if they hold the door open but were tricked into doing so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Eliciting Information

A

The discrete gathering of information. For example a conversation in which tricks the other party into giving useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Whaling

A

Spear Phishing but aimed at somebody big like a CEO.

A focused scam using information to create legitimacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Prepending

A

Adds text to Hoax of Spam that looks the the email system produced to create legitimacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Identity Fraud

A

Used specific details of someone’s identity to impersonate them. Also compromised accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Invoice Scams

A

Spoofs invoice details but changes changes bank account number. You fake being the collector of a bill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Credential Harvesting

A

Campaign specifically designed to steal account credentials on mass typically but can be small scale. Threat actor might just sell instead hacking further.

17
Q

What is Reconnaissance

A

Reconnaissance is the practice of covertly discovering and collecting information about a system.

18
Q

What is Hoax

A

Fake security alerts/chain Emails. introduces a potential threat and offer fake solution.

19
Q

What is Impersonation

A

Pretending to be someone else.

20
Q

What is Watering Hole attack

A

A passive hack wherein the threat actor creates a fake something people want to use to enact malicious intentions. Example making a fake app for local pizza place that acts as a trojan.

21
Q

What is Typo Squatting

A

You register a domain that is spelled extremely similar to something legitimate and wait.

22
Q

What is Pretexting

A

Is an attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.

23
Q

What is Influence campaign

A

An attack or series of attacks launched by a group. Specifically to influence public opinion.

24
Q

What is Hybrid warfare

A

An influence campaign deployed along with espionage, disinformation/fake news, and hacking.

25
Q

What is Social media

A

websites and applications that enable users to create and share content or to participate in social networking.

26
Q

What is Social Engineering Principles (reasons for effectiveness)

A

Familiarity/Liking// Be Affable able to make people like you

Consensus/Social Proof// Using polite behavior/ societal constraints to your advantage.

Authority and Intimidation// Using feigned authority or peoples bias against being wrong.

Scarcity and Urgency// creating demand or urgency to trick targets.

27
Q

What is Social Engineering Principle Authority

A

People hesitate to enter conflict with perceived superiors

28
Q

What is Social Engineering Principle Intimidation

A

Overloading the person with jargon/ making them feel stupid/ threats of repercussions

29
Q

What is Social Engineering Principle Consensus

A

A social engineering attack can use this instinct either to persuade the target that to refuse a request would be odd or to exploit polite behavior.

30
Q

What is Social Engineering Principle Scarcity

A

Convincing the target that they will miss out.

31
Q

What is Social Engineering Principle Familiarity

A

Getting chummy with the target

32
Q

What is Social Engineering Principle Trust

A
33
Q

What is Social Engineering Principle Urgency

A

Convincing the target of urgency requiring immediate action