Ready to Start Your Career?

By: fr4nc1stein
July 3, 2015
Social Engineering Overview | Mind Attacks

By: fr4nc1stein
July 3, 2015
Social Engineering Overview | Mind Attacks
What is social engineering?According to Wiki:"In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme." According to OWASP:"Social engineering attacks are are typically carried out by email or by contacting users by phone and impersonating an authorized user, in an attempt to gain unauthorized access to a system or application." According to my Security Researcher friend:- Social Engineering is being a good actor.
- Social Engineering is getting information by lying to other people.
- Direct Approach
- See Important Users
- Technical Support
- Email Attacks
- Social Media: Facebook/Twitter/LinkedIn
- Phishing Attacks
- IVR and Robocalls for Credit Card Information
- Protect your identity: use proxies and use other internet connections like Free WiFi to avoid tracking.
- Create a fake email and Facebook account. Use an interesting account, like GIRL, BEAUTIFUL PICTURES, SINGLE, 21-23 YEARS OLD.
- Select the victim and know her/his friends or family before sending an invitation to her/him.
- Become the victim's friend. Chat and become close to her/him and get some sensitive info. Then, download photos and maybe use an infected site and post to her chat box.
- Someone pressures you to do something quickly, be suspicious.
- Someone is asking you for important information
- Someone sends you an email that says you won a million dollars and to send them your bank details.
- Never share your password
- Verify contacts
- Educate staff
- Do not post personal information on any social media