Social Engineering
Social Engineering
Type of Social Engineering
Impresonation
- The attacker pretends to be someone legitimate or an authorized person
Attackers may impersonate a legitimate or authorized person either personally or using a communication medium such as phone, email, etc.
- Impersonation helps attackers to trick a target into revealing sensitive information
- The most common human-based social engineering technique
Phishing
- Phishing is the pratice of sending an illegitimate email claiming to be from a legitimate site in an attempt to acquire a user’s personal or account information
Types of Phishing
- Spear Phising
- Shaling
- Pharming The attacker redirects web traffic to a fraudulent website by installing a malicious program on a personal computer or server
- Spimming
Phishing Tools
- The Socail-Engineer Toolket (SET)
- ShellPhish
Other Techniques for Computer-based Social Engineering
- Pop-Up Windows
- Hoax Letters
- Chain Letters
- Instant Chat Messager
- Spam Email
- Scareware
setoolkit
Create Web Clone
Publishing Malicious Apps and Repackaging Legitimate Apps
This post is licensed under CC BY 4.0 by the author.
