comparing-different-types-of-social-engineering-techniques-slides
comparing-different-types-of-social-engineering-techniques-slides
Christopher Rees
PLURALSIGHT AUTHOR / ENTERPRISE IT OPS LEADER
If you enjoy the courses, leave a review on social media, tell your friends/colleagues
and help spread the word. It helps me create even more great content.
What is social engineering?
- Why is it so effective?
Module Social engineering techniques
Overview - Various techniques (phishing,
smishing, vishing)
- Shoulder surfing, dumpster diving
Influence Campaigns
- Hybrid warfare
Spear Phishing
Like phishing, except the target is well researched and appears to
come from a trusted sender
Whaling
Phishing campaigns that target the “big fish” within an organization,
for things like wire transfers, tax information and other financial data
Smishing
Phishing attacks carried over SMS
Smishing (SMS Phishing)
People 18-24
People 45-54
Voice Phishing
Social Engineering techniques designed
get the victim to divulge personal or
sensitive information
Attacker poses as legitimate company,
repair person, security personnel or
someone of trust
- Internal or external to the company
SPAM
Mitigation
- Shredding documents prior to disposal
- Locked waste cans to be transported
off-site for shredding/disposal
Shoulder surfing
Social engineering trick to get someone
to enter credentials into an application or
website
- Strike up a conversation about their kid’s
sports, then ask to see some pictures
- Should surf as they enter their
username/password into social media website
Shoulder surfing mitigation
- Privacy screens
- Masked passwords
• Multiple asterisks per keystroke further
obfuscates the length of a password
- Technical Controls
• Cameras to monitor doors, sensitive areas,
key card access, etc
Pharming
Host File
Victim Malicious
URL Resolved Website
to IP Address
DNS Cache
All these types of attacks are designed to elicit information from the user
Tailgating
Following someone into a building
through a gated area or badged access
area
- People want to be helpful
- Bad actors know that people will hold the
door for people who look like they belong
• Carrying lots of items, etc.
Phishing campaigns
Phishing, smishing, SPAM/SPIM, etc., can be used to gather user’s
credentials at scale
Malware
Can be used to target an individual victim, or entire websites and
networks. Credentials are often harvested and sold or pasted online
Influence campaigns
- Social media can be extremely powerful
in shaping public opinion
• Helping or hurting company image,
stock price, consumer confidence
• Public policy, elections, attitudes
toward government, law enforcement,
etc.
Principles (Reasons for Effectiveness)
Consensus/
Authority Intimidation
Social Proof
Influence Campaigns
- Hybrid warfare