Donanım & Yazılım

Social Engineering 101 – 02 (How does the Social Engineering work ?)

0
Lütfen giriş yap veya kayıt ol bunu yapmak için.

In this tutorial, you will learn how does it work ?

 

It is still one of the most common means of cyber attack. To Black hat hackers, the user is the ‘weakest link in the security chain’.

Steps for the social engineering attack cycle are usually as follows:

1) Prepare to use to phishing by gathering personal information such as his / her favorite sport, habit. Namely this step finding his/her personal information.

For example: the victim like to workout and black hat hackers send fake mail or sms to victim that this information. (like 70% discount for X brand Supplement)

2) Infiltrate by establishing a relationship or initiating an interaction, started by building trust.

3) Exploit the victim once trust and a weakness are established to advance the attack.

4) Disengage once the user has taken the desired action.

This process can take place in a single email or over months in a series of social media chats. But it ultimately concludes with an action you take, like sharing your information or exposing yourself to malware.

 

Social Engineering 101 - 03 (Techniques of Social Engineering)
GEN.G SON BATI TAKIMI OLAN CLOUD9’I MSI’DAN ELEDİ!

Reactions

0
0
0
0
0
0
Zaten bu yazı için tepki gösterdi.

Tepkiler

Henüz beğenen olmadı.

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir