-Social engineering/spoofing
-done by email, text etc, URL
-can spot by spelling, fonts, graphics
Vishing
Phishing
Impersonation
Spear fishing
Phishing
Ñame 2 types of typosquatting
URL hijacking- https://professor messier.com instead of messer
Prepending- https://pprofessor messer.com
Guy squatting with a gun held up to someone to change a URL
“Hi we’re calling from Visa about an auto payment and need your credentials” is an example of what?”
Pretexting
Phishing
Impersonation
Spear phishing
Pretexting, lying to get info
Wolf of Wall Street him teaching script scene
Redirect a legit website to a bogus site, poisoned dns server or client vulnerabilities
Pharming
Phishing is harvesting large groups of people
False, pharming
Phishing collects access credentials
Anti malware is great for detecting pharming
False, everything appears legit to the user
Type of phishing: Caller ID spoofing, fake security or bank updates, done over phone
Vishing
Fish on phone with fingers in v shape
Type of phishing done by text, spoofing and forwards links to ask for personal information
Smishing
“Yeah we smushed”
Gather information on a victim, digital footprint. Understands security posture and focuses on key systems
Reconnaissance
A renaissance knight with a scroll asking people questions
An attacker builds this through social media, where you work, your bank, family/friends
Pretext
Targeted phishing with inside information that includes whaling
Spear phishing
Never click a link in an email, type it out to see if it is legit
True
Attacker pretending to be someone, using details from reconnaissance, May pretend to be higher rank, May try to throw technical details or act like a buddy
Impersonation
When Donny Burger gives you a fake name you go with it!
Seen with vishing
Victims don’t realize it is happening (hacking the human) Getting info from victim
Pretexting
Impersonation
Spoofing
Eliciting information
Eliciting information
An e ice cream cone that each time you press to lick, a new fact about you is presented
Identity being used by someone not you. Includes: credit card, bank, lone and govt benefits fraud
Impersonation
Social engineering
Identity fraud
Pharming
Identity fraud
Important information thrown out with the trash that can be gathered for an attack and is typically done at the end of the month
Dumpster diving
Control I put by being aware of your surroundings, use privacy filters, keeping monitors away from windows and hallways are ways to prevent this
Shoulder surfing
Blacks a screen unless you are sitting directly in front of a monitor
Privacy filter
A threat that doesn’t actually exist, often through email and is attempting to get money but not through an electric means. Not a virus but can waste almost as much time
Computer hoax
Spoofing
Pharming
Dumpster diving
Computer Hoax
Stephen a bamboozled, run a muck
Consider source, cross reference, spam filters and if it sounds too good to be true are ways to what?
De-hoaxing
Eliciting information
Adware
Rdns
De-hoaxing
Detective Hoch
Determines which website the victim group to uses by infecting third party sites with site vulnerability/email attachments to infect all visitors who go to that site and gain access to your network
Watering hole attack
Ex. Infecting a site you know people visit so every time they visit then malicious JavaScript files are downloaded to your computer
Defense in depth, firewalls and IPS, antivirus/anti malware signature updates are best methods to prevent what kind of attack?
Spraying
Watering hole
Man in the middle
Crypto malware
Watering hole attack
Unsolicited messages by emails, forums etc by phishing attempts
Spam
Over IM is SPIM
Used to identify spam,only receives email from trustee sender and SMTP blocks anything that doesn’t follow RFC standards
Allowed list
Recipient filtering
ACL
rDNS
Allowed list