- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 144字
- 2021-06-30 19:15:58
Pretexting
This is a method of indirectly putting pressure on targets to get them to divulge some information or perform unusual actions. It involves the construction of an elaborate lie that has been well-researched so as to appear legitimate to the target. This technique has been able to get accountants to release huge amounts of money to imaginary bosses who issue an order for payment into a certain account. It is therefore very easy for a hacker to use this technique to steal login credentials of users, or to get access to some sensitive files. Pretexting can be used to mediate an even bigger social engineering attack that will use the legitimate information to construe another lie. Social engineers that use pretexting have honed the art of impersonating other trusted individuals in society, such as police officers, debt collectors, tax officials, clergy, or investigators.
- Learning OpenDaylight
- Ubuntu Linux操作系統(tǒng)
- Implementing Azure DevOps Solutions
- 精解Windows8
- Windows Vista融會(huì)貫通
- AutoCAD 2014中文版從入門到精通
- 計(jì)算機(jī)系統(tǒng)的自主設(shè)計(jì)
- 分布式高可用架構(gòu)之道
- Linux軟件管理平臺(tái)設(shè)計(jì)與實(shí)現(xiàn)
- Windows Server 2008組網(wǎng)技術(shù)與實(shí)訓(xùn)(第3版)
- Android應(yīng)用性能優(yōu)化最佳實(shí)踐
- Implementing Domain-Specific Languages with Xtext and Xtend(Second Edition)
- 電腦辦公(Windows 7+Office 2016)入門與提高
- Gradle Effective Implementations Guide(Second Edition)
- 分布式實(shí)時(shí)處理系統(tǒng):原理、架構(gòu)與實(shí)現(xiàn)