This document discusses social engineering techniques used by malicious attackers to trick users into revealing sensitive information. It describes how social engineering tools like the Social Engineer Toolkit use phishing to acquire information by generating curiosity in victims who input details through emails and texts. The document advises prevention methods like protecting data, conducting security assessments, implementing policies, and verifying sources to avoid falling for social engineering attacks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100%(1)100% found this document useful (1 vote)
169 views5 pages
Social Engineering
This document discusses social engineering techniques used by malicious attackers to trick users into revealing sensitive information. It describes how social engineering tools like the Social Engineer Toolkit use phishing to acquire information by generating curiosity in victims who input details through emails and texts. The document advises prevention methods like protecting data, conducting security assessments, implementing policies, and verifying sources to avoid falling for social engineering attacks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Social Engineering
How Yoong Han
TP038203 UC2F1704IT(ISS) Ethical Hacking and Incident Response Introduction
Malicious attack tricking users into giving away
important information Identify security protocols Gain victim’s trust in order to gain sensitive information Engage their curiosity and engineer them to open email SOCIAL ENGINEERING TOOLKIT Open-source Python Social-Engineer toolkit(SET) is designed to perform attacks using an exploitation toolkit. Used to attack organisations or person during penetration testing Designed to protect one of the toughest attacks in the internet world Phishing
Acquire information in a way to create
curiosity in within victims Usually in a form of email or text message Users will input sensitive information Attackers attains information Malware installed once linked is clicked Prevention
Protecting confidential data
Cyber security assessments from time to time Implement a security policy Double check source