Chapter 2 - 05 - Understand Social Engineering Attacks - 06_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EG-Gouncil
Tags
Related
- Chapter 4 - 02 - Discuss Identity and Access Management (IAM) - 01_ocred.pdf
- Chapter 4 - 02 - Discuss Identity and Access Management (IAM) - 02_ocred.pdf
- Chapter 4 - 02 - Discuss Identity and Access Management (IAM) - 08_ocred.pdf
- Chapter 2 - 05 - Understand Social Engineering Attacks - 06_ocred_fax_ocred.pdf
- Blue Modern Futuristic Cyber Security Presentation.pdf
- Info Assurance Notes.pdf
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Information Security Attacks Identity Theft Identity theft is a crime in which an imposter steals your personally N identifiable information such as name, credit card number, social security or driver’s license numbers, etc. to commit fraud or other cri...
Certified Cybersecurity Technician Exam 212-82 Information Security Attacks Identity Theft Identity theft is a crime in which an imposter steals your personally N identifiable information such as name, credit card number, social security or driver’s license numbers, etc. to commit fraud or other crimes I. - o ‘ | " O e @ | ———— Attackers can use identity theft to impersonate employees of a target organization and physically access facilities the Social-Engineer Toolkit Toolkit is a product of TrustedSec. menu: Spear-Phishing [2) website Attack Third Party Modules Update the Social-Engineer Update SET configuration Help, Credits, and About Toolkit https://www.trustedsec.com to using th Test https://github.com/trustedsec/p https://www.trustedsec.com PenTe sec/ptf one.trustedsec.com e Social-Engineer Toolkit (SET) stop shop for all of your SE needs. Attack Vectors Vectors] Infectious Media Generator Create a Payload and Listener Mass Mailer Attack Arduino-Based Attack Vector Wireless Access Point Attack Vector QRCode Generator Attack Vector Powershell Attack Vectors Third Party Modules Return back to the main menu. 1. Figure 2.54: Screenshot of SET showing menu and attack options Some social engineering tools are listed below: SpeedPhish Framework (SPF) (https://github.com) Gophish (https://getgophish.com) King Phisher (https://github.com) LUCY (https.//www.lucysecurity.com) MSI Simple Phish (https://microsolved.com) Module 02 Page 318 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.