Chapter 2 - 05 - Understand Social Engineering Attacks PDF
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Certified Cybersecurity Technician Information Security Attacks PDF
- Certified Cybersecurity Technician Exam 212-82 Impersonation (Vishing) PDF
- Certified Cybersecurity Technician Information Security Attacks PDF
- Certified Cybersecurity Technician Exam 212-82 Behaviors Vulnerable to Attacks PDF
- Certified Cybersecurity Technician Exam 212-82 PDF
- Identity Theft PDF
Summary
This document discusses social engineering attacks, including identity theft, and lists associated tools. It's likely part of a cybersecurity training or textbook.
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Information Security Attacks Identity Theft Identity theft is a crime in which an imposter steals your personally N identifiable information such as name, credit card number, social security or driver’s license numbers, etc. to commit fraud or other cri...
Certified Cybersecurity Technician Exam 212-82 Information Security Attacks Identity Theft Identity theft is a crime in which an imposter steals your personally N identifiable information such as name, credit card number, social security or driver’s license numbers, etc. to commit fraud or other crimes I. - o ‘ | " O e @ | ———— Attackers can use identity theft to impersonate employees of a target organization and physically access facilities the Social-Engineer Toolkit Toolkit is a product of TrustedSec. menu: Spear-Phishing [2) website Attack Third Party Modules Update the Social-Engineer Update SET configuration Help, Credits, and About Toolkit https://www.trustedsec.com to using th Test https://github.com/trustedsec/p https://www.trustedsec.com PenTe sec/ptf one.trustedsec.com e Social-Engineer Toolkit (SET) stop shop for all of your SE needs. Attack Vectors Vectors] Infectious Media Generator Create a Payload and Listener Mass Mailer Attack Arduino-Based Attack Vector Wireless Access Point Attack Vector QRCode Generator Attack Vector Powershell Attack Vectors Third Party Modules Return back to the main menu. 1. Figure 2.54: Screenshot of SET showing menu and attack options Some social engineering tools are listed below: SpeedPhish Framework (SPF) (https://github.com) Gophish (https://getgophish.com) King Phisher (https://github.com) LUCY (https.//www.lucysecurity.com) MSI Simple Phish (https://microsolved.com) Module 02 Page 318 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.