Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Phishing Techniques

10

Flashcards

0/10

Still learning
StarStarStarStar

Clone Phishing

StarStarStarStar

An attack where a legitimate, previously delivered email is duplicated, but with malicious links or attachments. An example is resending a company-wide email with a malicious attachment replacing the original one.

StarStarStarStar

Angler Phishing

StarStarStarStar

Utilizing social media platforms to impersonate customer service accounts to reach victims. An example is a fake support account on Twitter asking for your account details.

StarStarStarStar

Content Injection Phishing

StarStarStarStar

Altering part of an existing webpage to inject malicious content or links. For example, adding a malicious login form to a webpage that looks like part of the site's original content.

StarStarStarStar

Session Hijacking

StarStarStarStar

Exploiting a valid computer session to gain unauthorized access to information or services. An example is taking over a user's session after they've logged in to a banking website.

StarStarStarStar

Spear Phishing

StarStarStarStar

A targeted attack aimed at a specific individual or organization. An example would be getting an email that appears to come from your company's IT department asking for your login details.

StarStarStarStar

Whaling

StarStarStarStar

A form of spear phishing that targets high-profile individuals like CEOs. An example is a fake legal subpoena email sent to a company executive.

StarStarStarStar

Smishing

StarStarStarStar

Phishing via SMS text messages. An example is getting a text that claims you've won a prize and asking you to click on a suspicious link.

StarStarStarStar

Vishing

StarStarStarStar

Phishing conducted by voice or over the telephone. An example is receiving a call from someone claiming to be from your bank asking for your credit card number.

StarStarStarStar

Pharming

StarStarStarStar

Redirecting users from a legitimate website to a fraudulent one. An example would be tampering with DNS server settings to redirect users without their knowledge.

StarStarStarStar

Watering Hole Attack

StarStarStarStar

Compromising a popular website to target its users by injecting it with malicious code. For example, infecting a site frequented by a specific group with malware.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.