100% found this document useful (1 vote)
169 views5 pages

Social Engineering

This document discusses social engineering techniques used by malicious attackers to trick users into revealing sensitive information. It describes how social engineering tools like the Social Engineer Toolkit use phishing to acquire information by generating curiosity in victims who input details through emails and texts. The document advises prevention methods like protecting data, conducting security assessments, implementing policies, and verifying sources to avoid falling for social engineering attacks.

Uploaded by

yoonghan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
169 views5 pages

Social Engineering

This document discusses social engineering techniques used by malicious attackers to trick users into revealing sensitive information. It describes how social engineering tools like the Social Engineer Toolkit use phishing to acquire information by generating curiosity in victims who input details through emails and texts. The document advises prevention methods like protecting data, conducting security assessments, implementing policies, and verifying sources to avoid falling for social engineering attacks.

Uploaded by

yoonghan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Social Engineering

How Yoong Han


TP038203
UC2F1704IT(ISS)
Ethical Hacking and Incident Response
Introduction

 Malicious attack tricking users into giving away


important information
 Identify security protocols
 Gain victim’s trust in order to gain sensitive information
 Engage their curiosity and engineer them to open email
SOCIAL ENGINEERING TOOLKIT
 Open-source Python
 Social-Engineer toolkit(SET) is designed to
perform attacks using an exploitation toolkit.
 Used to attack organisations or person during
penetration testing
 Designed to protect one of the toughest
attacks in the internet world
Phishing

 Acquire information in a way to create


curiosity in within victims
 Usually in a form of email or text message
 Users will input sensitive information
 Attackers attains information
 Malware installed once linked is clicked
Prevention

 Protecting confidential data


 Cyber security assessments from time to
time
 Implement a security policy
 Double check source

You might also like