4 Types of Social Engineering In Cyber Security
Social engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information. Social engineers often rely on people’s willingness to be helpful but also prey on people’s weaknesses. For example, an attacker could call an authorized employee with an urgent problem that requires immediate network access. The attacker could appeal to the employee’s vanity, invoke authority using name-dropping techniques, or appeal to the employee’s greed. In this article, I want to look at four types of social engineering in cyber security.
These are some types of social engineering attacks:
This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data. An example involves an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.
This is when an attacker quickly follows an authorized person into a secure location. We often watch that in films when someone will follow the server administrator to a location and force him to reveal the hidden information under duress. Such individual might also be threatened to reveal such information .
#3 Something for Something (Quid pro quo)
This is when an attacker requests personal information from a party in exchange for something, like a free gift. The authorized person might be promised something substantial in order to force those information out.
Wi-Fi Password Cracking
Wi-Fi password cracking is the process of discovering the password used to protect a wireless network. These are some techniques used in password cracking:
The attacker manipulates a person who knows the password into providing it. That is why you should learn to confirm information from the right source before you reveal information. Do not respond to enquires online. Please , try avoid clicking any link that you find in an email as well.
The attacker tries several possible passwords in an attempt to guess the password. If the password is a 4-digit number, for example, the attacker would have to try every one of the 10000 combinations. Brute-force attacks usually involve a word-list file. This is a text file containing a list of words taken from a dictionary. A program then tries each word and common combinations. Because brute-force attacks take time, complex passwords take much longer to guess. A few password brute-force tools include Ophcrack, L0phtCrack, THC Hydra, RainbowCrack, and Medusa.
By listening and capturing packets sent on the network, an attacker may be able to discover the password if the password is being sent unencrypted (in plain text). If the password is encrypted, the attacker may still be able to reveal it by using a password cracking tool.
Now Tell Us Your Own Side Of This Story.
We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.
You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.
You Can Also Join Our WhatsApp Group Here.
Finding the right Long-tail Keywords? Start Your Journey Here.
233 total views, 5 views today