Post

Social Engineering

Social Engineering

Type of Social Engineering

Impresonation

  • The attacker pretends to be someone legitimate or an authorized person
  • Attackers may impersonate a legitimate or authorized person either personally or using a communication medium such as phone, email, etc.

  • Impersonation helps attackers to trick a target into revealing sensitive information
  • The most common human-based social engineering technique

Phishing

  • Phishing is the pratice of sending an illegitimate email claiming to be from a legitimate site in an attempt to acquire a user’s personal or account information

Types of Phishing

  • Spear Phising
  • Shaling
  • Pharming The attacker redirects web traffic to a fraudulent website by installing a malicious program on a personal computer or server
  • Spimming

Phishing Tools

  • The Socail-Engineer Toolket (SET)
  • ShellPhish

Other Techniques for Computer-based Social Engineering

  • Pop-Up Windows
  • Hoax Letters
  • Chain Letters
  • Instant Chat Messager
  • Spam Email
  • Scareware

setoolkit

Create Web Clone

Publishing Malicious Apps and Repackaging Legitimate Apps

H1

This post is licensed under CC BY 4.0 by the author.