Lesson 4: Identifying Social Engineering and Malware

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering social engineering techniques and malware indicators from Lesson 4.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Social engineering

Means of eliciting information or getting someone to perform actions, often called hacking the human.

2
New cards

Phishing

A social engineering technique that uses spoofed messages to persuade a user to interact with a malicious resource or provide credentials.

3
New cards

Spear phishing

Targeted phishing tailored to an individual or organization using known details.

4
New cards

Whaling

Spear phishing directed at high-level executives or ‘big fish.’

5
New cards

Vishing

Phishing conducted via voice calls to obtain sensitive information.

6
New cards

SMiShing

Phishing delivered through SMS/text messages.

7
New cards

Pretexting

Impersonation using a crafted story to obtain information or access.

8
New cards

Impersonation

Pretending to be someone else to gain trust or obtain credentials; includes pretexting.

9
New cards

Tailgating

Following an authorized person into a secure area to gain entry.

10
New cards

Piggy backing

Entering a secure area with an employee’s permission, often by holding the door.

11
New cards

Dumpster diving

Searching through trash for sensitive information or discarded media.

12
New cards

Shoulder surfing

Watching someone enter credentials or sensitive data, often from a distance.

13
New cards

Lunchtime attack

Attacking when a user leaves a workstation unattended and logged in.

14
New cards

Typosquatting

Registering lookalike domains to mislead users or facilitate phishing/pharming.

15
New cards

Pharming

Redirecting users from a legitimate site to a malicious one by corrupting name resolution.

16
New cards

Watering hole

Compromising a site commonly visited by the target to infect visitors.

17
New cards

Credential harvesting

Stealing account credentials through phishing, pharming, or other methods.

18
New cards

Backdoor

An access method that bypasses normal authentication to control a host.

19
New cards

RAT (Remote Access Trojan)

Backdoor malware that covertly provides remote control of a compromised host.

20
New cards

Bot

Malware under the attacker’s control.

21
New cards

Botnet

A network of bots controlled by one malware instance for coordinated actions.

22
New cards

C2 / Command and Control

The channel used by attackers to communicate with compromised systems.

23
New cards

Rootkit

Malware that hides its presence at a kernel or system level to avoid detection.

24
New cards

Trojan

Malware disguised as legitimate software that installs without user consent.

25
New cards

Virus

Malware that replicates and spreads by infecting files; can be non-resident, memory-resident, boot, or script/macro based.

26
New cards

Worm

Self-propagating malware that spreads over networks without user action.

27
New cards

Polymorphic

Viruses that dynamically change their code to evade detection.

28
New cards

Multipartite

Viruses that spread via multiple vectors.

29
New cards

PUA / PUP (Potentially Unwanted Program/Application)

Software installed alongside legitimate software that may be unwanted or confusing.

30
New cards

Adware

Software that displays ads or tracks user activity; can modify browser settings.

31
New cards

Spyware

Malware that monitors activity, captures data, or exfiltrates information.

32
New cards

Keylogger

Spyware that records keystrokes to steal credentials or confidential data.

33
New cards

Fileless malware

Malware that runs in memory without writing to disk, often using legitimate tools.

34
New cards

Sandbox

Isolated environment to safely analyze suspicious code or malware.

35
New cards

Cuckoo sandbox

A turnkey sandbox solution used for malware analysis.

36
New cards

PowerShell / WMI

System scripting tools commonly used by fileless malware to execute payloads.

37
New cards

Cryptojacking / Crypto-mining

Malware that uses the victim’s resources to mine cryptocurrency.

38
New cards

Ransomware

Malware that encrypts files and demands payment for decryption.

39
New cards

Crypto-malware

Ransomware that may also hijack resources for cryptocurrency mining.

40
New cards

Time bomb / Logic bomb

Malware triggered by a specific time or event.

41
New cards

Malvertising

Infected or malicious advertising delivered through legitimate websites.

42
New cards

Phishing variants (Spear phishing, Whaling, Vishing, SMiShing)

Different vectors of phishing targeted at individuals or groups.

43
New cards

Pharming

Passive redirection to a malicious site via DNS/name resolution manipulation.

44
New cards

Typosquatting (domain lookalikes)

Registering similar domains to deceive users and harvest credentials.