Social Engineering Flashcards
What Is Phishing?
Sent Usually In Email Form but can use other method of delivery
Trying To Get You To Press A Link To Gather Personal Information
Social Engineering With Spoofing
What Is Spoofing?
When You Hide Your True Identity and Pretend To Be Someone Else to Trick The Recipient
What Is Typosquatting?
This is a type of URL hijacking, its where the URL looks similar to the real website or what the user is expecting
True Site - www.google.co.uk
Fake Site - www.gogle.co.uk
What Is Prepending?
This Is Where the hacker adds something onto the beginning of the URL so fool the recipient
What Is Pretexting?
Hacker Lying to Gain Information
Hacker Might be a character in a situation they create
Pretending to be from Amazon, Bank or Similar to gain information
What Is Pharming?
Redirection Of A Real Site To A Fake Site
This might be due to a website, DNS or client vulnerability
What Is Vishing?
Same as Phishing but over Voice (phone) instead
They may use Caller ID Spoofing to show a real number but they might be calling from a different number
The goal Is the same as phishing, its an attempt to gain person infomation
What Is Smishing?
Same as Phishing but over text
They spoof the caller ID to pretend to be from an actual legit company or person you recognise
They attempt to gain personal information via reply or links
Why Would Hackers Use Phishing?
They need to gain information on a person, they may not attempt to attack straight away but will gather information first to make the phish more likely to succeed
What Is Spearphishing?
This is a targeted phishing attempt on a certain person / company
What Is Whaling?
When they target a CEO or someone with full control over an accounts system to gain entry
What Would Be Considered Pre Text In Impersonation?
This would be where they set a trap before they attack
There would be an actor and a story
Essentially The Bit Before The Attack
What Is Impersonation?
Hackers Pretend To Be Someone They Are Not
They Will Impersonate Someone You May Trust OR Believe
This is why they use Pre Text Before An Attack
What Is Eliciting Information?
Where the hacker extracts information from the victim
They often don’t know its even happening as they believe the hacker
This is common with Vishing
What Is Dumpster Diving?
Checking Whats Been Thrown Out
The Attacker Will Review The Trash And See What Information It Has
This can then be used for attack