1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Reconnaissance emails
Used to check if the destination mailbox is in use for future phishing attacks
Types of recon emails
Spam - random characters
Social engineering - Create sense of urgency, authority, famliarity
Tracking pixels - Check if email has been viewed and info about client
What can a tracking pixel capture?
OS
type of website or email e.g. mobile/desktop
Type of client e.g. browser/client
Screen resolution
Date and time email read
IP address
Tracking Pixel
HTML code tracking user behaviour and info
Credential Harvester emails
Usually look like legit company email
Request credentials
Can take to fake website needing you to log in
Smishing
SMS phishing (text messages)
Can be sent in bulk
Vishing
Voice phishing (phone call)
Usually target employees for sensitive info
Whaling
Highly targeted attacks on management level employees e.g. COO, CEO, CFO
Sent in small volumes
Microsoft Office Macros and dangers
Series of commands that can be run automatically
Disabled by default so phisher needs to convince you to activate
Malicious macros can install malware
Spam emails
Unwanted but not necessarily malicious e.g. newsletters, marketing, updates
False Positives
Emails incorrectly reported as malicious