Social Engineering
Jump to navigation
Jump to search
Summary
Description what this documentation is about.
Requirements
In order to execute a social engineering attack you need to understand the basis of social engineering described below.
Description
Social Engineering is the art of collecting information with some kind of human relation. The goal of social engineering is to guide a person into a certain direction preferably in a volitional one. This leads into spying on someone's personal environement to achieve a definite goal e.g manipulation of elections, retrieving information, stealing money, ...
Phases
Explain 4 Phases of Social Engineering
Information Gathering
Getting in Contact
Exploit the Attack Vector
Vanish Traceless
Attacks
Common Attacks
Phishing
Pretexting
Tailgaiting
Ransomeware
Dumpster Diving
Pop-Up Window
Pharming
USB Drop
Prevention
How to mitgate or prevent social engineering attacks
Clarify Attacks
Set Security Standards
Implement Security Tools
References
- https://www.sciencedirect.com/science/article/abs/pii/S2214212614001343?via%3Dihub
- https://link.springer.com/chapter/10.1007/978-3-642-22424-9_4
- https://www.mdpi.com/1999-5903/11/4/89
- https://www.researchgate.net/profile/Hugo-Barbosa/publication/315351300_SOCIAL_ENGINEERING_AND_CYBER_SECURITY/links/599c43430f7e9b892bafc0df/SOCIAL-ENGINEERING-AND-CYBER-SECURITY.pdf