Social Engineering Flashcards
Pretexting
Here a hacker gains information through a series of well crafted lies. Scam initiated by perpetrator pretending to need sensitive information so they can perform critical tasks
Prepending
Adding something to the begging of a item.
Supply info later to be acted on.
Third party authorization
Using previously used projects to obtain information
Impersonation
Attacker assumes a role that is recognized by the person being attacked.
Credential harvesting
The act of harvesting things such as ID passwords usernames
Hoax
False stories in the hope to create security risks
Reconnaissance
The act of trying to get information before hostilities
Invoice scams
Sending false invoices to companies in hood that they pay it.
Whailing
The act of spear phishing but upon high value targets like ceo or cfo
Tailgating / Piggybacking
The act of following behind someone to gain physical access to a building using their id or pin
Shoulder Surfing
Act of looking over someone’s should in hopes to gain sensitive information
Pharming
The act of poisoning a DNS server to redirect people to a attackers website
Eliciting information
Calling in to help desk or tech support to gain information you shouldn’t have.
Identity Fraud
Use of fake credentials to achieve a end.
Dumpster diving
The act of diving into trash in hopes to gain access to sensitive information