OP 12 April, 2022 - 07:25 PM
(This post was last modified: 12 April, 2022 - 07:26 PM by watmore. Edited 2 times in total.)
Gather Information
This is the first stage.He learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.
Plan Attack
The attackers outline how he/she intends to execute the attack
Acquire Tools
These include computer programs that an attacker will use when launching the attack.
Attack
Exploit the weaknesses in the target system.
Use acquired knowledge
Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.
To counter intimidating circumstances
Users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.
To counter phishing techniques
Most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be.
To counter tailgating attacks
Users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.
To counter human curiosity
It is better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.
This is the first stage.He learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.
Plan Attack
The attackers outline how he/she intends to execute the attack
Acquire Tools
These include computer programs that an attacker will use when launching the attack.
Attack
Exploit the weaknesses in the target system.
Use acquired knowledge
Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.
To counter intimidating circumstances
Users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.
To counter phishing techniques
Most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be.
To counter tailgating attacks
Users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.
To counter human curiosity
It is better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.
Have a fun, don't forget to click like button