Types of soc eng Flashcards

1
Q

Physical social engineering attacks

A

Tailgating
Shoulder surfing
Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual social engineering attacks

A

Phishing
Spear phishing
Whaling
Vishing
Hoax
Watering hole attack
(Pharming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering

A

an attempt by an attacker to convince someone to provide info or perform an action they normally woudn’t

(such as providing their password or clicking on a malicious link)

Often trying to gain access to the IT infrastructure or the phisical facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Commonly used to try to trick users into giving up personal information (such as user
accounts and passwords), click a malicious link, or open a malicious attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spear phishing

A

targets specific groups of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whaling

A

targets high-level executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vishing

A

Voice-phishing, phone based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Smishing

A

uses sms(text) messaging on mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SPAM

A

Unsolicited email, generally considered an irritant

(defeat with strong spam filtering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SPIM

A

SPAM over instant messaging, considered irritant

(IM and mobile providers providing some protection;
create cryptic usernames and do not list your ID in the IM service public directory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dumpster diving

A

Gathering important details (intelligence) from things that people have thrown out in their trash

(Often legal and may target individuals or organisations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tailgating

A

when an authorized individual might follow you in through that open door without badging in themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Eliciting information / elicitation

A

strategic use of casual conversation to extract information without the arousing suspicio of the target

(can involve complex cover stories and co-conspirators)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder surfing

A

a criminal practice where thieves steal your personal data by spying over your shoulder

(can happen anywhere with any device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pharming

A

an online scam similar to phishing, where a website’s traffic is manipulated, and confidential information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity fraud / Identity theft

A

use of another person’s personal information, without authorization, to commit a crime or to deceive or defraud that person or other 3rd party

17
Q

Prepending

A

adding words or phrases like “safe” to a malicious file or suggesting topics via social engineering to uncover information of interest

18
Q

Invoice scams

A

fake invoices with a goal of receiving money or by prompting a victim to put their credentials into a fake login screen

19
Q

Credential harvesting

A

trying to gain access to your usernames and passwords that might be stored on your local computer

(frequent goalof phishing attempts;
countermeasures: email defense, anti-malware, EDR/XDR solutions that will check URLS and block the scripts often used to execute the attack)

20
Q

Reconnaissance

A

comon and comes in multiple forms: passive, semi-passive and active discovery

Passive discovery - techniques that do not send packets to the target like Google hacking, phone calls, DNS and WHOIS lookups

Semi-passive discovery - touches the target with packets in a non-aggressive fashion to avoid raising alarms of the target

Active discovery - more aggressive techniques likely to be notices by the target, including port scanning and tools like nmap and Metaspoit

21
Q

Hoaxes

A

intentional falsehoods coming in a variety of forms ranging from virus hoaxes to fake news

(social media)

22
Q

Impersonation

A

a form of fraud in which attackers pose as a nown or trusted person to dupe the user intosharing sensitive info, transferring money, etc.

23
Q

Watering hole attack

A

Attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware

24
Q

Typosquatting / URL hijacking

A

a form of cybersquatting (sitting on sites under someones else’s brand or copyright) targeting users who type an incorrect website address

often employ a drive-by download that can infect a device even if the user does not click anything

25
Q

Pretexting

A

an attacker tries to convince a victim to give up information of value, or access to a service or system - attacker develops a story, or pretext, in order to fool the victim.

The pretext often leans on establishing authority for the atttacker as someone who should have access to information

(The pretext often includes a character played by the scam artist, and a plausible situation in which that character needs access to info)

26
Q

Influence campaigns

A

A social engineering attack intended to manipulate the thoughts and minds of large groups of people

27
Q

Hybrid Warfare

A

Attack using a mixture of conventional and unconventional methods and resources to carry out the campaign

(may even include paid advertising)

28
Q

Social media

A

May use multiple social platforms everaging multiple/many individuals to amplify the message, influencing credibility.

May involve creating multiple fake accounts to post content and seed the spread.

29
Q
A