- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 144字
- 2021-06-30 19:15:58
Pretexting
This is a method of indirectly putting pressure on targets to get them to divulge some information or perform unusual actions. It involves the construction of an elaborate lie that has been well-researched so as to appear legitimate to the target. This technique has been able to get accountants to release huge amounts of money to imaginary bosses who issue an order for payment into a certain account. It is therefore very easy for a hacker to use this technique to steal login credentials of users, or to get access to some sensitive files. Pretexting can be used to mediate an even bigger social engineering attack that will use the legitimate information to construe another lie. Social engineers that use pretexting have honed the art of impersonating other trusted individuals in society, such as police officers, debt collectors, tax officials, clergy, or investigators.
- Citrix XenApp Performance Essentials
- Linux集群和自動化運維
- Docker+Kubernetes應用開發(fā)與快速上云
- Windows Server 2012網(wǎng)絡操作系統(tǒng)項目教程(第4版)
- Django Project Blueprints
- Java EE 7 Developer Handbook
- Linux系統(tǒng)安全:縱深防御、安全掃描與入侵檢測
- Getting Started with UDK
- openEuler操作系統(tǒng)核心技術與行業(yè)應用實踐
- iOS Programming Cookbook
- Microsoft DirectAccess Best Practices and Troubleshooting
- 計算機系統(tǒng)平臺
- Raspberry Pi Networking Cookbook
- Linux操作系統(tǒng)實用教程
- UG NX 4.0基礎培訓標準教程