In this tutorial, you will learn how does it work ?
It is still one of the most common means of cyber attack. To Black hat hackers, the user is the ‘weakest link in the security chain’.
Steps for the social engineering attack cycle are usually as follows:
1) Prepare to use to phishing by gathering personal information such as his / her favorite sport, habit. Namely this step finding his/her personal information.
For example: the victim like to workout and black hat hackers send fake mail or sms to victim that this information. (like 70% discount for X brand Supplement)
2) Infiltrate by establishing a relationship or initiating an interaction, started by building trust.
3) Exploit the victim once trust and a weakness are established to advance the attack.
4) Disengage once the user has taken the desired action.
This process can take place in a single email or over months in a series of social media chats. But it ultimately concludes with an action you take, like sharing your information or exposing yourself to malware.