Certified Ethical Hacker (CEH) : Social Engineering

0
655

Social Engineering Concepts

Vulnerability to Social Engineering Attacks

Phases of a Social Engineering Attack

  • Research
  • Select Target
  • Relationship
  • Exploit

Social Engineering Techniques

Human-based Social Engineering

  • Impersonation
  • Eavesdropping and Shoulder Surfing
  • Dumpster Diving
  • Reverse Social Engineering
  • Piggybacking and Tailgating

Computer-based Social Engineering

  • Phishing
  • Spear Phishing

Mobile-based Social Engineering

  • Publishing Malicious Apps
  • Repackaging Legitimate Apps
  • Fake Security Apps

Insider Attack

Impersonation on Social Networking Sites

Social Engineering Through Impersonation on Social Networking Sites

Risks of Social Networking in a Corporate Networks

Identity Theft

The process of Identity theft

Social Engineering Countermeasures

LEAVE A REPLY

Please enter your comment!
Please enter your name here