Phishing
Spam/Watering Hole Attacks
Impersonation/Dumpster Diving
Shoulder Surfing/Hoaxes/Influence Campaigns
Principles of Social Engineering/Other Social Engineering Attacks
100

Social engineering with a touch of spoofing; Often delivered by email, text, etc.; Usually there’s something not quite right; Check the URL 

What is Phishing

100

Unsolicited messages

What is Spam

100

Attackers pretend to be someone they aren’t

What is Impersonation

100

Surf from afar; 

What is Shoulder surfing 

100

Starts with a bit of spear phishing; Might also include a link to pay; Attacker sends a fake invoice

What is Invoice scams 

200

– A type of URL hijacking - https://professormessor.com – Prepending: https://pprofessormesser.com

What is Typosquatting 

200

What does SPIM abbreviated for?

What is Spam over Instant Messaging 

200

Credit card fraud; • Bank fraud; • Loan fraud; Government benefits fraud- All of these are types of 

What is Identity fraud 

200

If it sounds too good to be true; It’s the Internet. Believe no one

What is De-hoaxing 

200

Works alongside scarcity; Act quickly, don’t think- This is an example of ___________

What is Urgency 

300

Redirect a legit website to a bogus site

What is Pharming 

300

• Use an authorized person to gain unauthorized access to a building

What is Tailgating 

300

Can be easier to get this information over the phone ; Voice Phishing

What is Vishing 

300

• A threat that doesn’t actually exist, but they seem like they COULD be rea

What is Computer hoaxes?

300

Authority; Scarcity; Intimidation; Urgency; Familiarity / Liking; Trust; Scarcity; Consensus / Social proof - Are all examples of 

What is Social engineering principles 

400

Targeted phishing with inside information; – Makes the attack more believable

What is Spear phishing

400

Unsolicited email: Stopping it at the gateway before it reaches the user.

What are Mail gateways 

400

Extracting information from the victim; – Hacking the human

What is Eliciting information 

400

Divide, distract, and persuade

What is Nation-state actors 


400

Constantly changing;You never know what they’ll use next; May be in person or electronic; Phone calls from aggressive “customers” ;Emailed funeral notifications of a friend or associate

What is Effective social engineering 

500

SMS phishing that is done by text message

What is Smishing

500

Layered defense – It’s never one thing

What is Defense-in-depth

500

• Secure your garbage • Shred your documents-What do you call it when you do this?

What is protect your rubbish

500

• Influence campaigns • Influence campaigns; Enabled through Social media

What is Hacking public opinion

500

When someone says something like "There will be bad things if you don’t help" ; Different Examples of _______

What is Intimidation 

600

Spear phishing the CEO;  Targeted phishing with the possibility of a large catch

What is Whaling

600

Have the mountain come to you – Go where the mountain hangs out – The watering hole – This requires a bit of research

What is Watering Hole Attack

600

Gather details that can be used for a different attack from important information thrown out with the trash

What is Dumpster diving 

600

Military strategy; Influence with a military spin; Wage war non-traditionally

What is Hybrid warfare 

600

Also called password harvesting; – Everything happens in the background; Attackers collect these login

What is Credential harvesting 

M
e
n
u