1.0 Attacks, Threats, and Vulnerabilities Flashcards
Social engineering with a touch of spoofing
Phishing
A type of URL hijacking where attackers register intentionally misspelled domain names similar to popular domain names
Typosquatting
Lying to get information. Adding a disclaimer or information text to the emails received from external domains
Pretexting
Social engineering attack that targets individuals in an organization
Spear Phishing
Social engineering attack that targets high-profiled individuals in an organization
Whaling
Redirect a legit website to a bogus site
Pharming
Voice phishing
Vishing
SMS phishing
Smishing
Gather information about the victim before phishing
Reconnaissance
Attacker pretends to be someone they are not
Impersonation
A threat that does not actually exist
Computer hoaxes
Infect third-party site that is visited
Watering Hole Attack
Having a layered defense
Defense-in-Depth
Unsolicited messages
Spam
Spam over Instant Messaging
SPIM
Intentionally slow down the server conversation
Tarpitting
Attacker collects login credentials
Credential Harvesting
What are these a principle of?
1. Authority
2. Intimidation
3. Consensus/Social Proof
4. Scarcity
5. Urgency
6. Familiarity/Liking
7. Trust
Social Engineering Principles
Malicious software
Malware
Malware that can reproduce itself but needs you to execute a program
Virus
Virus that is part of the application
Program Virus
Virus that infects the boot sector
Boot Sector Virus
Virus that is OS and browser-based
Script Virus
Virus that is common in Microsoft Office
Macros Virus