[ Certified Ethical Hacker v10 ] :: [ Module 7 ]

This entry is part 9 of 21 in the series [ Certified Ethical Hacker Training ]

Module 7: Social Engineering

Social engineering falls into the category of non-technical attacks.

For the purposes of the CEH test, remember the usual lists.

Tactics: exploiting moral obligation, abusing trust, making threats, offering something for nothing, and taking advantage of ignorance.

Impacts: financial loss, terrorism, privacy loss, legal problems, loss of goodwill, outright business collapse.

Common avenues: shoulder surfing, dumpster diving, piggybacking, eavesdropping, phishing.

Fun exercises? Not so much, mostly because all these streets are dangerous to play on just for fun and practice. Caveat Hacktor.

Instead we have:

Recommended Movies

Catch Me If You Can

Matchstick Men

The Italian Job

Series Navigation<< [ Certified Ethical Hacker v10 ] :: [ Module 6 ][ Certified Ethical Hacker v10 ] :: [ Module 8 ] :: Denial of Service >>

Leave a Reply