👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • What is a Social Engineering?
  • How is it Used?
  • Phishing Overview
  • Physical Access
  • Rubber Ducky Overview
  • Stopping Social Engineering Attacks
  • Case Studies
  • GoPhish Tool Overview

Was this helpful?

  1. Exam Prep Notes
  2. Junior Penetration Tester (eJPTv2) - Notes
  3. Host & Network Penetration Testing

Social Engineering Fundamentals

What is a Social Engineering?

Social engineering is a technique where attackers manipulate people into revealing confidential information, performing actions, or making decisions that compromise security. It often involves exploiting human psychology, trust, and emotions to gain unauthorized access or sensitive information. This can happen through methods like impersonation, deception, or manipulation, without relying on traditional technical vulnerabilities. It's like a digital con artist tricking people into revealing their secrets or doing things they shouldn't.

How is it Used?

Social engineering is used by attackers in various ways. Below are some common tactics used in social engineering:

  1. Phishing: Attackers send fake emails or messages pretending to be trustworthy sources to trick recipients into revealing passwords, financial information, or clicking on malicious links.

  2. Pretexting: Attackers create fabricated scenarios or stories to gain victims' trust, often pretending to be someone authoritative or in need of help to extract sensitive information.

  3. Baiting: Attackers offer something enticing, like a free download, to lure victims into downloading malicious software that can steal data or compromise their systems.

  4. Impersonation: Attackers pretend to be someone the victim knows or trusts, exploiting personal relationships to extract information or influence actions.

  5. Quid Pro Quo: Attackers promise something in return for information or assistance, often exploiting people's desire for rewards to manipulate them.

  6. Emotional Pull: Manipulating emotions to gain trust or sympathy, such as creating a connection with the victim to make them more likely to share sensitive information.

  7. Urgency: Creating a sense of immediate importance or crisis to pressure victims into making quick decisions or revealing information without thinking.

  8. Free Stuff: Offering something for free to entice victims into taking actions they wouldn't normally do, like clicking on links or downloading malicious files.

  9. Blackmail/Extortion: Threatening to reveal embarrassing, damaging, or private information about the victim unless they comply with the attacker's demands.

  10. Watering Hole: Attackers target websites or online places that a specific group frequently visits. They infect these sites with malware to compromise the visitors' devices, taking advantage of the trust users have in those websites.

  11. Physical Access: Attackers use direct physical contact or manipulation to gain unauthorized access to a location or device. This might involve posing as a maintenance worker, tailgating through secure doors, or stealing devices to extract sensitive information.

Phishing Overview

Phishing is a cyberattack where attackers send deceptive messages, often via email, to trick individuals into divulging sensitive information like passwords or credit card details. This tactic preys on people's trust and curiosity.

  • Spear Phishing: Tailored phishing attacks that target specific individuals or groups, using personal details to make the message seem legitimate.

  • Whaling: Similar to spear phishing, but targeting high-profile individuals, like executives or CEOs.

  • Smishing: Phishing through SMS or text messages, where attackers use urgency or enticing offers to trick recipients into clicking on malicious links.

  • Vishing: Phishing over voice calls, usually using caller ID spoofing to appear trustworthy, often asking for sensitive information or payments. </aside>

Physical Access

Physical access refers to an attacker physically interacting with a device or system. In the context of hacking, it often involves manipulating hardware or using tools like the Rubber Ducky to exploit vulnerabilities that would be harder to exploit remotely. This highlights the importance of securing physical access to devices as it can lead to unauthorized control and compromise.

Rubber Ducky Overview

A Rubber Ducky is a small device that looks like a regular USB flash drive but is actually a tool for hacking. When plugged into a computer, it rapidly types pre-programmed commands, allowing attackers to quickly execute malicious actions, steal data, or compromise the system. It takes advantage of physical access to bypass security measures and gain control over a computer without the user's knowledge.

Stopping Social Engineering Attacks

User Awareness and Training: Educating users about the tactics and risks of social engineering helps them recognize and avoid such attacks. Training empowers individuals to be cautious with their interactions, reducing the likelihood of falling for manipulation.

Security Controls: Implementing technical measures like email filters, anti-phishing tools, and multi-factor authentication adds layers of protection against social engineering attempts. These controls make it harder for attackers to succeed.

Defense In Depth: Employing a combination of security measures at different levels, such as network, application, and physical security, creates a comprehensive defense strategy. This approach ensures that if one layer fails, others can still prevent or mitigate an attack.

Case Studies

Reading and learning about the following 6 case studies will help you understand social engineering in a better way.

  1. Google and Facebook Fake Invoicing

  2. FACC CEO Fraud

  3. Robinhood Vishing

  4. Fake Excel File

  5. HTML Table Windows Logo

  6. FIN7 USB in Mail </aside>

GoPhish Tool Overview

GoPhish is a cybersecurity tool that lets you simulate and conduct phishing campaigns for educational or testing purposes. It helps organizations assess their vulnerability to phishing attacks by creating realistic scenarios. Users can design and send phishing emails, track recipients' interactions, and gain insights into potential weaknesses in their security measures. GoPhish aids in improving employee awareness and overall security posture against real-world phishing threats.




Hacker's Mantra:In a world of virtual walls, hackers find a way to break free.

PreviousClearing Your Tracks On Windows & LinuxNextWeb Application Penetration Testing

Last updated 10 months ago

Was this helpful?

📚
📑
📶
🧑‍🔬