Explore tens of thousands of sets crafted by our community.
Phishing Techniques
10
Flashcards
0/10
Clone Phishing
An attack where a legitimate, previously delivered email is duplicated, but with malicious links or attachments. An example is resending a company-wide email with a malicious attachment replacing the original one.
Angler Phishing
Utilizing social media platforms to impersonate customer service accounts to reach victims. An example is a fake support account on Twitter asking for your account details.
Content Injection Phishing
Altering part of an existing webpage to inject malicious content or links. For example, adding a malicious login form to a webpage that looks like part of the site's original content.
Session Hijacking
Exploiting a valid computer session to gain unauthorized access to information or services. An example is taking over a user's session after they've logged in to a banking website.
Spear Phishing
A targeted attack aimed at a specific individual or organization. An example would be getting an email that appears to come from your company's IT department asking for your login details.
Whaling
A form of spear phishing that targets high-profile individuals like CEOs. An example is a fake legal subpoena email sent to a company executive.
Smishing
Phishing via SMS text messages. An example is getting a text that claims you've won a prize and asking you to click on a suspicious link.
Vishing
Phishing conducted by voice or over the telephone. An example is receiving a call from someone claiming to be from your bank asking for your credit card number.
Pharming
Redirecting users from a legitimate website to a fraudulent one. An example would be tampering with DNS server settings to redirect users without their knowledge.
Watering Hole Attack
Compromising a popular website to target its users by injecting it with malicious code. For example, infecting a site frequented by a specific group with malware.
© Hypatia.Tech. 2024 All rights reserved.