1.1 Compare and contrast different types of social engineering techniques. Flashcards

1
Q

What is Phishing?

A

An attacker posing as a trusted source but attempts to deliver a malicious payload or gather personal or sensitive information from an individual. The email typically claims that the user needs to connect to or log onto a site; this site may look very convincing but it is fake. The link in an email may download malicious software that perform attacks on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Smishing?

A

A smishing attack is a phishing attack that uses SMS instead of email. These are cleverly designed to look like common texts received from vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vishing?

A

Another form of phishing that is often done over Voice over IP (VoIP). Can be effective if prerecorded and using a spoofed telephone number to convince a target that the message is legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spam?

A

It is an unsolicited e-mail, usually advertising a product or service. A small amount of spams are really trying to steal your info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Spam over instant messaging (SPIM)?

A

It is Spam received over instant messaging instead of email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spear Phishing?

A

A form of phishing that is designed to target a certain group or individual instead of a generic email sent to a mass of people. These emails typically use info that is personal to the victims so that this lends credibility to the attacker to persuade them that the email is legit. Another tactic may to spoof a known sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is dumpster diving?

A

Attackers go dumpster diving for social engineering by trying to find information on a company that gives them further insight into operations, missions, etc. This can be prevented with screening trash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Shoulder Surfing?

A

When a person inconspicuously looks over a victim’s shoulders to see what they are viewing or typing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pharming?

A

In a pharming attack, the user is redirected to a fake site through some other means, such as malware on the computer, host file poisoning, or redirection from a DNS server that has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tailgating?

A

When an individual follows an authorized person through a security checkpoint or door to gain access to unauthorized areas. To mitigate, an organization needs to positively identify every individual. Mantraps are used to guard against tailgating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Eliciting Information?

A

Gathering info through various means. A common was to gather info is through social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Whaling?

A

A form of phishing that sends an email to a high-value target instead of the masses. These emails are higher stakes because high-value individuals have info that may be considered more critical to attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Prepending?

A

A link that adds an unexpected payload at the beginning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Identity fraud?

A

It is using someone else’s PII for personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an Invoice Scam?

A

An attacker submits a fake invoice that mimics that vendor’s invoice in every aspect except the payment destination that is the attacker’s info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Credential Harvesting?

A

Social engineering that focuses on gathering credentials of one or more persons inside an organization. It could serve as a recon tool, or it might be an end in and of itself as a tool for any other type of attack.

17
Q

What is Reconnaissance?

A

Every proper attack begins with a recon for weak spots. Social engineering along with passive scanning and researching social media are the first step towards any attack.

18
Q

What is a Hoax?

A

A hoax is a lie or false story that leads one or more people to believe something is true that is very much not true. Occasionally, they can be used to carry out serious attacks. These email hoaxes could have a virus attached to it or an attacker could use the email hoax to map out all the associates you have to get an idea of a network.

19
Q

What is Impersonation?

A

The attacker impersonates usually someone of higher privileges than the victim or someone that the victims think is a “nobody” that easily slips by unnoticed.

20
Q

What is a Watering Hole Attack?

A

A bad actor will research the web-usage patterns of a group of people that are of interest and will infest the sites that the group commonly visits and evidently trusts. These bad actors will then steal information.

21
Q

What is TypoSquatting/URL hijacking?

A

Where con artists and scammers buy up domains that differ just slightly with a spelling error that is common amongst users like www.aamazon.com for example. These sites will try to steal information from you. URL hijacking is similar that it will register the same domain name as a legitimate company, but with a different top-level domain.

22
Q

What is Pretexting?

A

Same as a phishing attack, but it creates a plausible scenario for the target to grant the desired information.

23
Q

What are Influence Campaigns?

A

What bad actors use to spread inaccurate, emotional, and fear-mongering information to cause chaos. The internet has made this so much worse.

24
Q

What is Hybrid warfare (Influence Campaigns)?

A

Hybrid Warfare means to use influence campaigns, such as “winning hearts and minds” strategies, as part of conventional warfare.

25
Q

What is Social Media (Influence Campaign)?

A

Bad actors can use social media to issue propaganda to a very large audience, even faster than newspapers, phones, or emails.

26
Q

What are principles (social engineering)?

A

These are the principles that make social engineering so effective.

27
Q

What is the principle of Authority in regards to social engineering (Principles)?

A

Social Engineer leverage authority based on two reactions: respect and fear. Attackers make use of these tendencies to convince us that we are required to take these actions by virtue of the position of authority they are impersonating.

28
Q

What is the principle of Intimidation in regards to social engineering (Principles)?

A

Attackers can intimidate victims into wanting them to go away. This principle of social engineering usually works better on inexperienced workers.

29
Q

What is the principle of Consensus in regards to social engineering (Principles)?

A

Unlike intimidation, a social engineer will likely be a little nicer, more understanding, and more sympathetic to the needs of the target. They will usually exploit personal information on a victim to find common ground and to relate with them in any way. This usually needs a little bit more of an effort from the attacker.

30
Q

What is the principle of Scarcity in regards to social engineering (Principles)?

A

The attacker will offer the victim something that they REALLY NEED . They use this as an incentive or a bit of a “thank you” for doing favors for the attacker.

31
Q

What is the principle of Familiarity in regards to social engineering (Principles)?

A

Developing a bond with a social engineer target can help the attacker to better persuade and influence the target into giving him what he wants.

32
Q

What is the principle of Trust in regards to social engineering (Principles)?

A

An attacker will take the time to build a level of trust needed for the intended purpose that they have. This principle tends to take a bit longer than some of the other principles.

33
Q

What is the principle of Urgency in regards to social engineering (Principles)?

A

An attacker may use urgency to get a victim to perform or get information in a short amount of time while the victim cannot think clearly or confirm the identity of the attacker.