Social Engineering Flashcards

1
Q

what is Phishing?

A

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is typosquatting?

A

preying on people making typos in the url bar.

example: ffacebook.com or facebok.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is pharming?

A

Basically mass phishing.

Typically redirection from a Poisoned DNS server or when a website has been completely taken over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is vishing?

A

Voice Phishing

Commonly combined with caller id spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is smishing?

A

sms phishing
spoofing is a problem here as well
texting phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spear phishing?

A

targeted phishing with inside information gained through reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is whaling?

A

targeting a c level executive with a phishing attack. typically the ceo or cfo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is shoulder surfing?

A

In its simplest terms it is looking at what someone is doing on their screen or any device without them knowing
It can be from right behind them, or from one building to another with binoculars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a watering hole attack?

A

After a bit of research attackers will exploit a 3rd party that your employees interact with or “drink from”.
Such as a local sandwich shop that is common for lunch.
It would infect all users visiting the website but they are only after specific targets from your company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spim?

A

Spam over instant messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is tailgating?

A

Using an authorized person to gain unauthorized access to a building or area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a invoice scam?

A

Starts with a bit of spear phishing.
An attacker Finds out who pays the invoices in an organization and sends a fake invoice to be paid.
Spoofing will typically be involved in the “from” field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is credential harvesting?

A

Also called password harvesting.
Taking stored passwords from your local machine, there are a lot of them stored on each local machine.

A user will open an email with a malicious Microsoft Word doc, a macro will run automatically, which will go into the operating system, extract the credentials, and then send them off to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly