Home » » The Complete Social Engineering Phishing Osint & Malware

The Complete Social Engineering Phishing Osint & Malware


 The Complete Social Engineering Phishing Osint & Malware

The Complete Social Engineering Phishing Osint & Malware

     Basically, social engineering is an art of manipulating people. But it comes to hacking it is important skills to hackers and it is one of the dangerous a technique that they hack into computer systems. Basically, when we are talking about the target through people it doesn't matter it could be a website or it could be companies or it could be an organization or just could be normal people. The overall idea is to associate with people or target website or target organization and hack through the people. Most companies spend a lot of money on securing their software and they have a team of security people and ethical hackers tries to hack their companies and secure their companies as possible. The whole idea of social engineering is to hack the people, web admins, employees and to hack their friends from their gain access to hack their target.


      Now the very popular questions that I get and you get to learn to hack and why do I learn to hack? Well there no of reasons, first of all, we teach you hacking and secure your self and organization and system from these attacks. There is a huge market for pentesters, so then they test their system and make sure that they secure and they no vulnerability. Then you will be paid and this is a normal job and there is a huge demand for it. This is also increased the awareness when we teach these they will get less effective. When you know are dangerous and you can more aware. These attacks are not as effective as there are. At the end of the day teach this or learn this is like kung-fu. You can use for good purpose and protect your friends, family or you can use for other purposes.


Types of Social Engineering Attacks

   There are many Social Engineering attacks like Phishing, Spear Phishing, Vishing, Pretexting, Baiting, Tailgating, Quid pro quo, Whaling attacks, Watering hole.


Phishing
     Phishing attacks are common in social engineering attacks. In this technique, the attackers use emails, social media, SMS to trick the victims of providing sensitive information or victims visiting malicious URL to compromise their system.



Prevention:

          1. You can prevent by using spam filters in your e-mail accounts.
          2. Don’t open any e-mails from untrusted sources or suspicious you find.



Spear Phishing

     Spear Phishing is assumed as a subset of Phishing, it requires an extra effort from the side of the attackers. It targets a specific organization or individual, seeking unauthorized access to sensitive information. Spear Phishing comes from a trusted source, the apparent source of the e-mail is likely to be an individual in own’s company or generally, someone in a position of authority or from someone the target knows personally.

     The attacker collect information from social media about targets, including their personal and professional relationships and other personal details. The attackers use this information to frame the target. The attacker sent an attachment that installs malware on the target’s device or directs the target to the malicious website for getting sensitive information like passwords, accounts information or credit card information. When the target clicks or opens the e-mail, they get hacked.

Prevention:

         1. Limit the amount of personal information you share on social media and other websites.
         2. Don’t  click on links without verifying the URL matches an e-mail’s stated destination.
         3. Contact the associate, friend or business purporting to send the message to confirm the request.



Vishing:
     Vishing is an electronic fraud tactic in which the individuals are tricked to getting personal information. It works like Phishing but does not conduct by over the internet and it is done by using voice technology. The attack can be conducted by the voice email, landline or cellphone.

Prevention:
1.       Verify unexpected phone requests are connected to incoming phone calls.
2.       Be very suspicious of any caller who asks for personal information.
3.  Any caller who makes this type of request is a scammer. Refuse the request and notify security.



Pretexting:

     Pretexting email is a form of social engineering technique for getting privileged data.

Prevention:

         1. Filter Employee Emails
         2. Provide Awareness Program
         3. Establish a Policy to Handle Suspected Pretexters.
         4. Get an Insider Threat Management Solution.



Baiting

     Baiting is similar to Phishing attacks. This the attack is also getting personal information like passwords etc.



Prevention of social engineering attacks:

        1. Delete any request for financial information.
             2. Reject request for help.  
        3. Set your spam filters to high.
        4. Secure your computing devices.
        5.  Beware of any download.
        6. Foreign offers are fake.

0 coment�rios:

Post a Comment

Link you don't want to vouch for Read more: https://html.com/seo/#ixzz5zVltiZ5g