Social Engineering Flashcards
Phishing
Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details or other sensitive details, by impersonating oneself as a trustworthy entity in a digital communication.
Smishing
SMS phishing
Vishing
Vishing is a social engineering attack that attempts to trick victims into giving up sensitive information over the phone.
Spear phishing
Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific victim, often for malicious reasons.
Whaling
A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.
Dumpster diving
Dumpster Diving is investigating a person or business’s trash to find information that can be used to attack a computer network. Dumpster divers locate financial statements, government records, medical bills, résumés, and the like simply through exploring the victim’s rubbish.
Shoulder surfing
Shoulder surfing occurs when someone watches over your shoulder to nab valuable information such as your password, ATM PIN, or credit card number, as you key it into an electronic device.
Social Engineering
Authority, Intimidation, Consensus, Scarcity, Familiarity, Trust, Urgency
Pharming
Pharming is a cyberattack intended to redirect a website’s traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software.
ipconfig /displaydns
C:\Windows\System32\drivers\etc\hosts
Spam
Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes. It can be sent in massive volume by botnets, networks of infected computers.
Spim
Spam over internet messengers
Tailgating, Piggybacking
In these types of attacks, someone without the proper authentication follows an authenticated employee into a restricted area. The attacker might impersonate a delivery driver and wait outside a building to get things started.
Man traps
A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
Prepending attack
Adding and extension or phrase to email header to fool user, adding information to manipulate user, suggesting topics via conversation to try to get information.
Identity Fraud
When a stolen identity is used, identity theft.