yrDJooVjUUVjPPmgydgdYJNMEAXQXw13gYAIRnOQ
E3xSA. Shared by NLD Blog
¯\_(ツ)_/¯
Something's wrong

We can't seem to find the page you are looking for, we'll fix that soon but for now you can return to the home page

Bookmark

What Is Social Engineering And Its Common Techniques.


Hello There Friend!

In This Post I Am Going To Tell You All About Social Engineering And The Techniques And Some Basic Definitions. We Will Also Discuss About The Tricks And Other Things That We Use In Social Engineering. First Of All We Should Know What Is Social Engineering?

What Is Social Engineering?

Social Engineering Is The Art Of Manipulating Users Of A Computing System Into Revealing Confidential Information That Can Be Used To Gain Unauthorized Access To A Computer System. The Term Can Also Include Activities Such As Exploiting Human Kindness, Greed, And Curiosity To Gain Access To Restricted Access Buildings Or Getting The Users To Installing Backdoor Software.

How Social Engineering Works?

Below Are The Steps Used By Hackers In A Social Engineering Attack:
  • Gather Information: This Is The First Stage, The Learns As Much As He Can About The Intended Victim. The Information Is Gathered From Company Websites, Other Publications And Sometimes By Talking To The Users Of The Target System.
  • Plan Attack: The Attackers Outline How He/She Intends To Execute The Attack.
  • Acquire Tools: These Include Computer Programs That An Attacker Will Use When Launching The Attack.
  • Attack: Exploit The Weaknesses In The Target System.
  • Use Acquired Knowledge: Information Gathered During The Social Engineering Tactics Such As Pet Names, Birthdates Of The Organization Founders, Etc. Is Used In Attacks Such As Password Guessing.

What Are Common Techniques In Social Engineering?

Social Engineering Is Not Only Composed Of A Single Hacking Trick It Includes Many Hacking Tricks Like:
  • Familiarity Exploit:

Users Are Less Suspicious Of People They Are Familiar With. An Attacker Can Familiarize Him/herself With The Users Of The Target System Prior To The Social Engineering Attack. The Attacker May Interact With Users During Meals, When Users Are Smoking He May Join, On Social Events, Etc. This Makes The Attacker Familiar To The Users. Let’s Suppose That The User Works In A Building That Requires An Access Code Or Card To Gain Access; The Attacker May Follow The Users As They Enter Such Places. The Users Are Most Like To Hold The Door Open For The Attacker To Go In As They Are Familiar With Them. The Attacker Can Also Ask For Answers To Questions Such As Where You Met Your Spouse, The Name Of Your High School Math Teacher, Etc. The Users Are Most Likely To Reveal Answers As They Trust The Familiar Face. This Information Could Be Used To Hack Email Accounts And Other Accounts That Ask Similar Questions If One Forgets Their Password.

  • Intimidating Circumstances:

People Tend To Avoid People Who Intimidate Others Around Them. Using This Technique, The Attacker May Pretend To Have A Heated Argument On The Phone Or With An Accomplice In The Scheme. The Attacker May Then Ask Users For Information Which Would Be Used To Compromise The Security Of The Users’ System. The Users Are Most Likely Give The Correct Answers Just To Avoid Having A Confrontation With The Attacker. This Technique Can Also Be Used To Avoid Been Checked At A Security Check Point.

  • Phishing: 

This Technique Uses Trickery And Deceit To Obtain Private Data From Users. The Social Engineer May Try To Impersonate A Genuine Website Such As Yahoo And Then Ask The Unsuspecting User To Confirm Their Account Name And Password. This Technique Could Also Be Used To Get Credit Card Information Or Any Other Valuable Personal Data.

  • Tailgating: 

This Technique Involves Following Users Behind As They Enter Restricted Areas. As A Human Courtesy, The User Is Most Likely To Let The Social Engineer Inside The Restricted Area.

  • Exploiting Human Curiosity: 

Using This Technique, The Social Engineer May Deliberately Drop A Virus Infected Flash Disk In An Area Where The Users Can Easily Pick It Up. The User Will Most Likely Plug The Flash Disk Into The Computer. The Flash Disk May Auto Run The Virus, Or The User May Be Tempted To Open A File With A Name Such As Porn Or Other File Which May Actually Be An Infected File.

  • Exploiting Human Greed:

Using This Technique, The Social Engineer May Lure The User With Promises Of Making A Lot Of Money Online By Filling In A Form And Confirm Their Details Using Credit Card Details, Etc.

After Knowing All These Hacking Attacks One Must Be Very Carefull While Doing All The Things Mentioned Above. Like Not Giving Your Credit Card Details To Any Unknown Number Or Signing In For Fake Followers Or Money.

That Is It. Hope You Have Liked This Post If You Want To Read More About Any Hacking Tricks Please Tell Me In The Comment Section.
Thank You. 


Hacking Is Illegal. Please Use These Tricks To Protect Others From These Hacking Tricks. Using These Tricks For Illegal Use Can Harm You And I Am Not Responsible For That. 
Post a Comment

Post a Comment