Zusammenfassung der Ressource
Hacking Techniques
- Social Engineering
- Pharming
- Malicious code is installed on a
personal computer or server
- Misdirects users to fraudulent web sites
without their knowledge or consent
- A computer with a compromised host file will go to the fake
Web site even if a user types in the correct internet address
- Blagging/pre-texting
- Creating and using an invented scenario to engage a targeted victim in
a manner that increases the chance the victim will divulge information
or perform actions that would be unlikely in ordinary circumstances
- Like calling a credit card
company as a spouse's and
asking to change account details
- Shoulder
surfing
- Looking over
someone's shoulder
when they are
entering a passwod
- Baiting scenarios
- Similar to phishing
- A promise of an item or good that
hackers use to attract victims
- May offer users free music or movie
downloads, if they surrender their
login credentials to a certain site
- Tailgating
- Unauthorized person follows an authorized person to enter a secured premise
- Quid-pro-quo
- Hacker offers a service or
benefit in exchange for
information or access
- Something
for
something
- Hoax viruses
- Message warning the
recipients of a non-existent
computer virus threat
- Message is usually a chain e-mail
that tells the recipients to
forward it to everyone they know