Podcast
Questions and Answers
What is external reconnaissance and what are the possible ways to perform it?
What is external reconnaissance and what are the possible ways to perform it?
External reconnaissance is gathering data about the target from outside its boundary to find its vulnerabilities and thinking of methods to exploit it. It typically focuses on the carelessness of the company's employees. They can perform ways such as dumpster diving, social media and social engineering.
Explain what is dumpster diving and what can an attacker gain from it?
Explain what is dumpster diving and what can an attacker gain from it?
Organizations get rid of devices that are out of date or no longer in use in a number of ways such as bidding, giving it to recyclers or dumping them in the dumpsters. An attacker will dive through that dumpster to get those devices. An attacker can gain information like an internal setup of an organization, openly stored login credentials on a browser, the privileges and details of users and access to customized system in the network.
How do you prevent dumpster diving?
How do you prevent dumpster diving?
Degaussing can be used to remove data. it reduces or eliminates the magnetic field that is stored on the disk of a computer. As for SSD, one suggested way would be to encrypt it with a long random key and forget that key.
What kind of attacks can an attacker make using social media?
What kind of attacks can an attacker make using social media?
Signup and view all the answers
Explain what is social engineering and what are the 6 levers of social engineering? Provide an example of each of the levers.
Explain what is social engineering and what are the 6 levers of social engineering? Provide an example of each of the levers.
Signup and view all the answers
Explain pretexting and give example.
Explain pretexting and give example.
Signup and view all the answers
Explain diversion theft and give example.
Explain diversion theft and give example.
Signup and view all the answers
Explain phishing and give example.
Explain phishing and give example.
Signup and view all the answers
Explain spear phishing.
Explain spear phishing.
Signup and view all the answers
Explain water holing.
Explain water holing.
Signup and view all the answers
Explain internal reconnaissance.
Explain internal reconnaissance.
Signup and view all the answers
Explain what wardriving and share tools that is able to perform
wardriving. Is there any way you can map wifi SSID to location?
Explain what wardriving and share tools that is able to perform wardriving. Is there any way you can map wifi SSID to location?
Signup and view all the answers
Explain what Extortion attacks is. Share a case study of a publicly known extortion attack.
Explain what Extortion attacks is. Share a case study of a publicly known extortion attack.
Signup and view all the answers
Explain why and how an attacker could attack company printers.
Explain why and how an attacker could attack company printers.
Signup and view all the answers