首页 > Web开发 > 详细

Penetration Test - Select Your Attacks(1)

时间:2020-09-13 11:45:00      阅读:86      评论:0      收藏:0      [点我收藏+]

Remote Social Engineering

SOCIAL ENGNEERING
  • Tricking or coercing people into violating security policy
  • Depends on willingness to be helpful
  • Human weaknesses can be leveraged
  • May rely on technical aspects
  • Bypasses access controls and most detection controls
PHISHING
  • Phishing - people are contacted by a seemingly legitimate imposter in an attempt to extract sensitive information
    • Spear phishing
    • SMS phishing
    • Voice phishing
    • Whaling
QUICK REVIEW
  • Social engineering is all about getting an authorized user to do your dirty work
  • Relies on most peoples‘ willingness to be helpful
  • Successful social engineering can bypass nearly all technical controls
  • Phishing is attempting to get a valid user to click on a link to your exploit

Penetration Test - Select Your Attacks(1)

原文:https://www.cnblogs.com/keepmoving1113/p/13660515.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!