Penetration Test - Select Your Attacks(2)

2021-01-02 02:29

阅读:629

标签:craft   man   user   can   ret   sys   sed   word   interview   

In-Person Social Engineering

MORE ATTACKS AND EXPLOITS
  • Elicitation
    • Gathering info about a system from authorized users
  • Interrogation
    • Informal interviews with crafted questions to extract info
  • Impersonation
    • Pretending to be someone with authority
  • Shoulder surfing
    • Watching as someone enters a username, password, PIN, etc
  • USB key drop
    • https://null-byte.wonderhowto.com/how-to/hack-wpa2-wi-fi-passwords-using-jedi-mind-tricks-usb-dead-drops-0185290/
MOTIVATION TECHNIQUES
  • Motivation techniques
    • Authority
    • Scarcity
    • Social proof
    • Urgency
    • Likeness
    • Fear
QUICK REVIEW
  • In-person social engineering often works because few people will confront someone face-to-face.
  • A good social engineering attacker can smooth-talk their way around many controls
  • Many computer users fail to understand how dangerous USB keys can be
  • Dropped USB keys will often be used for devious access to computers

Penetration Test - Select Your Attacks(2)

标签:craft   man   user   can   ret   sys   sed   word   interview   

原文地址:https://www.cnblogs.com/keepmoving1113/p/13669525.html


评论


亲,登录后才可以留言!