Types of soc eng Flashcards
Physical social engineering attacks
Tailgating
Shoulder surfing
Dumpster diving
Virtual social engineering attacks
Phishing
Spear phishing
Whaling
Vishing
Hoax
Watering hole attack
(Pharming)
Social engineering
an attempt by an attacker to convince someone to provide info or perform an action they normally woudn’t
(such as providing their password or clicking on a malicious link)
Often trying to gain access to the IT infrastructure or the phisical facility.
Phishing
Commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachment
Spear phishing
targets specific groups of users
Whaling
targets high-level executives
Vishing
Voice-phishing, phone based
Smishing
uses sms(text) messaging on mobile
SPAM
Unsolicited email, generally considered an irritant
(defeat with strong spam filtering)
SPIM
SPAM over instant messaging, considered irritant
(IM and mobile providers providing some protection;
create cryptic usernames and do not list your ID in the IM service public directory)
Dumpster diving
Gathering important details (intelligence) from things that people have thrown out in their trash
(Often legal and may target individuals or organisations)
Tailgating
when an authorized individual might follow you in through that open door without badging in themselves
Eliciting information / elicitation
strategic use of casual conversation to extract information without the arousing suspicio of the target
(can involve complex cover stories and co-conspirators)
Shoulder surfing
a criminal practice where thieves steal your personal data by spying over your shoulder
(can happen anywhere with any device)
Pharming
an online scam similar to phishing, where a website’s traffic is manipulated, and confidential information is stolen.