Social Engineering attacks





                             Image result for social engineering attacks

Pretexting – A hacker calls an individual and lies to them in an attempt to gain access to privileged data.

                    Image result for social engineering attacks Pretexting



Phishing - A malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.

           
              Image result for social engineering attacks Phishing

Spam - Use spam email to trick a user to click an infected link or download an infected file.



Baiting - A hacker leaves a malware-infected physical device, such as a USB flash drive in a public location such as a corporate washroom.


Image result for social engineering attacks Baiting


              

Comments

Popular posts from this blog

OpenID Connect Introduction

How to hack windows 2000 using nessus.....

Crypt-analysis