Social Engineering Flashcards

1
Q

What Is Phishing?

A

Sent Usually In Email Form but can use other method of delivery
Trying To Get You To Press A Link To Gather Personal Information
Social Engineering With Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Is Spoofing?

A

When You Hide Your True Identity and Pretend To Be Someone Else to Trick The Recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Is Typosquatting?

A

This is a type of URL hijacking, its where the URL looks similar to the real website or what the user is expecting
True Site - www.google.co.uk
Fake Site - www.gogle.co.uk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Is Prepending?

A

This Is Where the hacker adds something onto the beginning of the URL so fool the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Is Pretexting?

A

Hacker Lying to Gain Information
Hacker Might be a character in a situation they create
Pretending to be from Amazon, Bank or Similar to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Is Pharming?

A

Redirection Of A Real Site To A Fake Site

This might be due to a website, DNS or client vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Is Vishing?

A

Same as Phishing but over Voice (phone) instead
They may use Caller ID Spoofing to show a real number but they might be calling from a different number
The goal Is the same as phishing, its an attempt to gain person infomation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Is Smishing?

A

Same as Phishing but over text
They spoof the caller ID to pretend to be from an actual legit company or person you recognise
They attempt to gain personal information via reply or links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why Would Hackers Use Phishing?

A

They need to gain information on a person, they may not attempt to attack straight away but will gather information first to make the phish more likely to succeed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Is Spearphishing?

A

This is a targeted phishing attempt on a certain person / company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Is Whaling?

A

When they target a CEO or someone with full control over an accounts system to gain entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Would Be Considered Pre Text In Impersonation?

A

This would be where they set a trap before they attack
There would be an actor and a story
Essentially The Bit Before The Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Is Impersonation?

A

Hackers Pretend To Be Someone They Are Not
They Will Impersonate Someone You May Trust OR Believe
This is why they use Pre Text Before An Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Is Eliciting Information?

A

Where the hacker extracts information from the victim
They often don’t know its even happening as they believe the hacker
This is common with Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Is Dumpster Diving?

A

Checking Whats Been Thrown Out
The Attacker Will Review The Trash And See What Information It Has
This can then be used for attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is Dumpster Diving Legal?

A

It can be, it depends on where you are but generally if something is chucked away as rubbish you can collect it

17
Q

What Is Shoulder Surfing?

A

Someone Checking Whats On Your Screen

Essentially ‘looking over there shoulder’

18
Q

What Can You Do To Limit Shoulder Surfing?

A

Use Privacy Filters
Be aware of surroundings
Ensure Monitors Are Not In View

19
Q

What Is A Computer Hoaxes

A

A threat that doesnt exist but could be real

20
Q

What Are Types Of Computer Hoaxes

A

Fake Virus Pop Up
Fake Malware Warning
Email Stating You Have Won Money and TO Contact Somone to Claim
Essentially A Fake Issue Or Similar to get the victim to call or purchase something

21
Q

What Is A Watering Hole Attack?

A

A watering hole attack works by identifying a website that’s frequented by users within a targeted organisation, or even an entire sector, such as defence, government or healthcare.That website is then compromised to enable the distribution of malware.
The attacker identifies weaknesses in the main target’s cyber-security, then manipulates the watering hole site to deliver malware that will exploit these weaknesses

22
Q

Why Use A Watering Hole Attack?

A

This would be used if a network is very secure and the hackers are trying to find a way in, by using a 3rd party site they are not gaining access via the main network but rely on the users to visit the 3rd party side to then gain access to the main network

23
Q

What Is Defence In Depth?

A

This is layered defence to cover all entry points in a network

24
Q

What IS Spam?

A

Unsolicited Message

This could be via email, advert, pop up

Spam can also be used in phishing to get personal information

25
Q

What is SPIM?

A

Spam over instant message

26
Q

How To Reduce Mail Spam

A

Spam System / Spam Filter

27
Q

What Tools Would A Spam System Use To Detect and Reduce Spam?

A

rDNS - Reverse DNS, ensure the senders domain matches the IP address its come from
Allow and Block List - does require user management but only allowing emails from safe senders
SMTP Standard Checking - Running checks on sending email system to ensure it complies with RFC standard

28
Q

What is Tarpitting?

A

This slows down the mail server on purpose to frustrate the spammer so they skip over your network

29
Q

What Is An Influence Campaigns?

A

This is where hackers create fake users and content and spread it around as such can influence real people

30
Q

What Is Tailgating?

A

Uses an authorised person to gain unauthorised access

31
Q

What Is Credential Harvesting?

A

Might Be Known As Password Harvesting
Its where hackers attempt to access credentials on your network
They will try and run a script on a local computer via a link in an email or similar