Social Engineering
An attack against a user and typically involves some form of social interaction.
Phishing
A type of social engineering in which an attacker attempts to obtain sensitive information by pretending a trusted entity.
Smishing
Vishing
SPAM
SPIM (Spam over Instant Message)
Spear Phising
Targets a specific person or group of people with something in common.
Dumpster Diving
Going through the victim’s trash in hopes of finding valuable information that be used in a penetration attempt.
Shoulder Surfing
The attacker directly observes the individual entering sensitive information on a form, keyboard, or keypad.
Pharming
Consists of misdirecting users to fake websites made to look official.
Tailgating
The simple tactic of following closely behind a person who has just used their own access card or pin to gain physical access to a room or building.
Eliciting Information
Posing as a trusted entity, an attacker can get a password reset, information about some system, or other useful information.
Whaling
Where the target is a high value person, such as a CEO or CFO.
Prepending
The act of supplying information that another will act upon.
Identity Fraud
Invoice Scams
Credentials Harvesting
Reconnaissance