Social Engineering Techniques and Exploits Flashcards

1
Q

Phishing

A

Emails or messages from reputable sources to manipulate the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vishing

A

phone calls or voice messages from reputable sources to manipulate the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Whaling

A

Phishing big targets such as CEOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shoulder surfing

A

Peering over a user to obtain sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tailgating

A

The process of jumping through an access point after a user used their data to authenticate the action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dumpster Diving

A

Physically going through trash in search of sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

Disguising yourself as someone or something who has access to sensitive areas or info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evil Twin

A

Rogue Access Point - someone setting up an AC in the proximity of a network that has SSID info that is identical to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDoS

A

Distributed Denial of Service. Uses assistance from other computers (drones) all connectors to the attackers controller to attack a larger entity or company to preform DoS functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS

A

Denial of Service. Someone inadvertently brings a common service or utility offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-day attack

A

The very first time a threat has been actualized and no one but the attacker knows about it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On-path attack

A

Attacker is attempting to get in the middle of point to point communication to disrupt or monitor activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spoofing

A

In ref to On-path attacks. Attacker creating false info such as forged IP’s or MAC addresses and sending it on the path between source and destination to fool the source that the attacker is the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Brute-force or Dictionary Attacks

A

Guessing the password or trying every possible combination via automation

You can load in entire dictionary that helps speed up the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SQL injection

A

Injects information into a form managed by a SQL database which can then be understood by the SQL backend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cross-site scripting (XSS)

A

When an attacker can send a bogus link that when the victim clicks on it, downloads some other sort of malware

17
Q

Insider Threat

A

Fraudulent employee acting within the company or space