What Is Social Engineering

SkyRest

Katılımcı Üye
15 May 2016
400
241
25
MEDUSA

unknown.png

What is Social Engineering


Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).



Security is all about knowing who and what to trust. It is important to know when and when not to take a person at their word and when the person you are communicating with is who they say they are. The same is true of online interactions and website usage: when do you trust that the website you are using is legitimate or is safe to provide your information?


Ask any security professional and they will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and deadbolts are on your doors and windows, or if have guard dogs, alarm systems, floodlights, fences with barbed wire, and armed security personnel; if you trust the person at the gate who says he is the pizza delivery guy and you let him in without first checking to see if he is legitimate you are completely exposed to whatever risk he represents.

b71lg5s.png

Types of Social Engineering
Social engineering is a general term that refers to a broad range of manipulation tactics used by hackers to acquire information.


Baiting: Baiting is a social engineering attack where the attacker entices the user with a free item to lure them into clicking on a link. This may come in the form of a free music or movie download lined up with the user’s interests. When the unsuspecting user clicks the link, they become infected with malware.
Phishing: Phishing is a type of social engineering attack that uses email, phone or text to entice a user to click on a malicious link. The communication appears to be from a legitimate source connected to the user. When the user selects the ill-intentioned link, the user’s device or system becomes infected with malware and data is often compromised.
Pretexting: This tactic is one more commonly associated with the term social engineering. With pretexting, an individual impersonates a representative from a trusted organization with the goal of acquiring sensitive information. This social engineering technique relies heavily on gathering research before initiating contact with the target.
Quid Pro Quo: The quid pro quo attack is a variation of baiting. Often known as the “something for something” social engineering technique, the quid pro quo attack involves promising a service or benefit for complying with the request of an attacker. For example, a social engineer may promise a free software upgrade to entice a user to download what is actually malware to their system.
Reverse Social Engineering: In this kind of social engineering scheme, the attacker convinces a target that they have a problem or issue and then positions themselves with a solution. The target then initiates contact with the social engineer believing that they are able to solve their problem.
Tailgating: This social engineering tactic is a physical attack. With tailgating, a hacker gains access to restricted areas of a building by following an approved employee into the building and piggybacking on their credentials. In these cases, the social engineer often pretends to be an employee or even a delivery person.

Whaling and Spear Phishing: These attacks are a variation of phishing and, because they target a specific individual, they require a significant amount of research. In whaling attacks, these individuals are high-profile people, often executives or the C-suite.

aXNsaWstMi5qcGc

How to Prevent and Protect Against Social Engineering

The best form of prevention against social engineering attacks is end-user training. Teaching your employees how to recognize social engineering tactics and avoid them is of the utmost importance.

Here are some points to help support your training efforts.


>Research any suspicious calls, emails or texts.<
>Open attachments only from trusted sources.<
>Immediately delete any emails or texts asking for passwords or personally identifiable information (PII), such as social security numbers or financial information.<
>Don’t open any emails promising prizes or notification of winnings.<
>Download software only from approved sources.<
>Be wary of urgent requests or solicitations for help.<
>Make sure you have spam filters and antivirus software on your device.<

>When in doubt, contact IT to confirm any technology-related requests.<


Phishing-Saldirisi-Nedir-Nasil-korunulur5afea6a3c5385.png



unknown.png



Social engineering is a set of malicious activities by cybercriminals that aim to psychologically manipulate a targeted victim into giving them sensitive information and data.

Social engineering relies on human error rather than security vulnerabilities, especially in network systems, software, and operating systems. Because errors made by legitimate users are less predictable, they are more difficult to detect than malware-based intrusions. In general, social engineering attacks basically have two main purposes:


Sabotage: Causes damage or inconvenience by disrupting business or corrupting data.
Cyber Theft: Gains access to sensitive and critical information or valuables such as money.


Social Engineering Tips

In Social Engineering, money is not usually the goal; is to access the system to be hacked in a number of non-technical ways in cases where it is technically impossible to reach.

You can destroy many systems with your awesome imagination without needing much technical knowledge to become a social engineer.



How Social Engineering Works

5wp1jzj.jpg


Social engineering attacks usually occur when there is well-established communication between hackers and victims. Hackers direct and motivate the user to compromise sensitive information, rather than using a brute force attack outright to breach the user's data. The social engineering attack lifecycle provides criminals with a reliable process that can easily deceive the victim. The steps involved in the social engineering lifecycle include:

1. Target Research

Preparing for an attack requires the hacker to plan ahead. During the research period, the target's name, personal details and background information are determined. Based on this information, attack methods/channels are selected.

74j5oyq.jpg


2. Convince the Target
In this step, the hacker engages the target victim with a make-believe story based on the information gathered in the first step. Here, the hacker's goal is to gain the victim's trust.
3. Attack
After gaining the necessary confidence, the target turns to extracting the knowledge, which is the main goal. The hacker uses or sells the information for his purpose.
4. Exit
Once the target of the attack is complete, the interaction window is typically closed by the hacker to avoid any detection or suspicion. The hacker then tries to cover his tracks and do his best. Using a combination of phone and email phishing techniques, an attack can be carried out and persuade the victim to provide sensitive (bank/social security login) information.

unknown.png



px19hzz.png
b71lg5s.png
ezaacht.png


Translators

@SkyRest @swarq
 
Moderatör tarafında düzenlendi:

xmajestar

Katılımcı Üye
13 Ocak 2021
624
105
tzdata-TR

unknown.png

What is Social Engineering


Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).



Security is all about knowing who and what to trust. It is important to know when and when not to take a person at their word and when the person you are communicating with is who they say they are. The same is true of online interactions and website usage: when do you trust that the website you are using is legitimate or is safe to provide your information?


Ask any security professional and they will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and deadbolts are on your doors and windows, or if have guard dogs, alarm systems, floodlights, fences with barbed wire, and armed security personnel; if you trust the person at the gate who says he is the pizza delivery guy and you let him in without first checking to see if he is legitimate you are completely exposed to whatever risk he represents.

b71lg5s.png

Types of Social Engineering
Social engineering is a general term that refers to a broad range of manipulation tactics used by hackers to acquire information.


Baiting: Baiting is a social engineering attack where the attacker entices the user with a free item to lure them into clicking on a link. This may come in the form of a free music or movie download lined up with the user’s interests. When the unsuspecting user clicks the link, they become infected with malware.
Phishing: Phishing is a type of social engineering attack that uses email, phone or text to entice a user to click on a malicious link. The communication appears to be from a legitimate source connected to the user. When the user selects the ill-intentioned link, the user’s device or system becomes infected with malware and data is often compromised.
Pretexting: This tactic is one more commonly associated with the term social engineering. With pretexting, an individual impersonates a representative from a trusted organization with the goal of acquiring sensitive information. This social engineering technique relies heavily on gathering research before initiating contact with the target.
Quid Pro Quo: The quid pro quo attack is a variation of baiting. Often known as the “something for something” social engineering technique, the quid pro quo attack involves promising a service or benefit for complying with the request of an attacker. For example, a social engineer may promise a free software upgrade to entice a user to download what is actually malware to their system.
Reverse Social Engineering: In this kind of social engineering scheme, the attacker convinces a target that they have a problem or issue and then positions themselves with a solution. The target then initiates contact with the social engineer believing that they are able to solve their problem.
Tailgating: This social engineering tactic is a physical attack. With tailgating, a hacker gains access to restricted areas of a building by following an approved employee into the building and piggybacking on their credentials. In these cases, the social engineer often pretends to be an employee or even a delivery person.

Whaling and Spear Phishing: These attacks are a variation of phishing and, because they target a specific individual, they require a significant amount of research. In whaling attacks, these individuals are high-profile people, often executives or the C-suite.

aXNsaWstMi5qcGc

How to Prevent and Protect Against Social Engineering

The best form of prevention against social engineering attacks is end-user training. Teaching your employees how to recognize social engineering tactics and avoid them is of the utmost importance.

Here are some points to help support your training efforts.


>Research any suspicious calls, emails or texts.<
>Open attachments only from trusted sources.<
>Immediately delete any emails or texts asking for passwords or personally identifiable information (PII), such as social security numbers or financial information.<
>Don’t open any emails promising prizes or notification of winnings.<
>Download software only from approved sources.<
>Be wary of urgent requests or solicitations for help.<
>Make sure you have spam filters and antivirus software on your device.<

>When in doubt, contact IT to confirm any technology-related requests.<


Phishing-Saldirisi-Nedir-Nasil-korunulur5afea6a3c5385.png



unknown.png



Social engineering is a set of malicious activities by cybercriminals that aim to psychologically manipulate a targeted victim into giving them sensitive information and data.

Social engineering relies on human error rather than security vulnerabilities, especially in network systems, software, and operating systems. Because errors made by legitimate users are less predictable, they are more difficult to detect than malware-based intrusions. In general, social engineering attacks basically have two main purposes:


Sabotage: Causes damage or inconvenience by disrupting business or corrupting data.
Cyber Theft: Gains access to sensitive and critical information or valuables such as money.


Social Engineering Tips

In Social Engineering, money is not usually the goal; is to access the system to be hacked in a number of non-technical ways in cases where it is technically impossible to reach.

You can destroy many systems with your awesome imagination without needing much technical knowledge to become a social engineer.



How Social Engineering Works

5wp1jzj.jpg


Social engineering attacks usually occur when there is well-established communication between hackers and victims. Hackers direct and motivate the user to compromise sensitive information, rather than using a brute force attack outright to breach the user's data. The social engineering attack lifecycle provides criminals with a reliable process that can easily deceive the victim. The steps involved in the social engineering lifecycle include:

1. Target Research

Preparing for an attack requires the hacker to plan ahead. During the research period, the target's name, personal details and background information are determined. Based on this information, attack methods/channels are selected.

74j5oyq.jpg


2. Convince the Target
In this step, the hacker engages the target victim with a make-believe story based on the information gathered in the first step. Here, the hacker's goal is to gain the victim's trust.
3. Attack
After gaining the necessary confidence, the target turns to extracting the knowledge, which is the main goal. The hacker uses or sells the information for his purpose.
4. Exit
Once the target of the attack is complete, the interaction window is typically closed by the hacker to avoid any detection or suspicion. The hacker then tries to cover his tracks and do his best. Using a combination of phone and email phishing techniques, an attack can be carried out and persuade the victim to provide sensitive (bank/social security login) information.

unknown.png



px19hzz.png
b71lg5s.png
ezaacht.png


Translators

@SkyRest @swarq
Thanks for subcejt
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.