Social Engineering

From Embedded Lab Vienna for IoT & Security
Revision as of 17:39, 21 December 2021 by ORetzer (talk | contribs) (Initial)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Summary

Description what this documentation is about.

Requirements

In order to execute a social engineering attack you need to understand the basis of social engineering described below.

Description

Social Engineering is the art of collecting information with some kind of human relation. The goal of social engineering is to guide a person into a certain direction preferably in a volitional one. This leads into spying on someone's personal environement to achieve a definite goal e.g manipulation of elections, retrieving information, stealing money, ...

Phases

Explain 4 Phases of Social Engineering

Information Gathering

Getting in Contact

Exploit the Attack Vector

Vanish Traceless

Attacks

Common Attacks

Phishing

Pretexting

Tailgaiting

Ransomeware

Dumpster Diving

Pop-Up Window

Pharming

USB Drop

Prevention

How to mitgate or prevent social engineering attacks

Clarify Attacks

Set Security Standards

Implement Security Tools

References