The VX-Files
The VX-Files
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvz
  • Download your own local copy or check my other libre projects: Github/malcrvz
  • 📕Cybersecurity Theory
    • Index
      • Malware types
        • Viruses, worms and Trojans
        • Backdoors, Rootkits and Spyware
        • Botnets, DDoS and Spammer
        • Ransomware
        • Scareware and Adware/PUP/PUA
        • Downloaders and Launchers
        • Hacktool
        • APT - Advanced Persistent Threat
      • Social engineering techniques
        • Phishing
        • Pretexting
        • Baiting
        • Quid pro quo
        • Tailgating
      • Cryptography
        • Hash functions
        • Symmetric, Asymmetric and Hybrid cryptography
        • Digital signatures & Digital certificates
        • TLS Protocol
      • Pentesting methodology & Techniques
        • CIA Triad - Confidentiality, Integrity & Availability
        • The methodology steps
        • Pre-Engagement
        • Information Gathering
          • HTTP status codes
          • robots.txt
        • Vulnerability Assessment
        • Exploitation
          • Password cracking
        • Post-Exploitation & Persistence
          • Types of Shells
        • Privilege Escalation & Lateral Movement
        • Reporting & Remediation
  • 🐧Linux Essentials
    • Index
      • 1, 0, bits, Bytes: Units of digital information
      • User management
      • Packet management
      • Privileges & sudo
      • Passwd & Shadow files
      • Managing files, links and regex
      • find
      • Terminal/TTY
      • SSH
  • 🪟Windows Essentials
    • Index
      • CLI user management
      • CMD File management
  • 🌍Networking Essentials
    • Index
      • Windows CLI IP management
      • Linux IP management
      • Linux CLI Wi-Fi connection
  • 🕸️Network Pentesting
    • Tools
      • 1. Pre-Engagement
        • OpenVPN
      • 2. Information gathering
        • cURL & wget
        • Nmap
        • arp
        • Netcat
        • whatweb
      • 3. Vulnerability assessment
        • smbclient
      • 4. Exploitation
        • Metasploit
        • Hashcat
        • John the Ripper
      • 5. Post-Exploitation & Persistence
        • SSH
      • 6. Privilege escalation & Lateral movement
        • Possible privilege escalation vectors - Auto-enumeration scripts
      • 7. Reporting & Remediation
    • Techniques
      • Upgrade reverse shell to interactive
      • Transferring files to/from remote victim
      • Possible privilege escalation vectors - Manual checklist
    • Resources
      • Manufacturer default passwords lists
        • IP Cameras
      • Get Shells
  • 💉Web App pentesting
    • Tools
      • CeWL
      • Gobuster
      • whatweb
    • Techniques
      • Command injection
    • Resources
      • Reverse Shells
      • Bind Shells
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniques
      • Removing Linux user passwords
      • Removing Windows user passwords
    • Resources
  • 💽Disks & Forensics
    • Index
      • Getting a disk ready
      • Inodes & Sectors
      • Recover deleted files
      • BUILDING - Secure file deletion
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
Powered by GitBook
On this page
  • Spear Phishing
  • Whaling
  • Vishing
  • Smishing
  • Pharming
  • Watering Hole Attack
  • Business Email Compromise (BEC)
  1. Cybersecurity Theory
  2. Index
  3. Social engineering techniques

Phishing

Phishing is a social engineering attack where criminals try to lure the victim into unknowingly give away its credentials or to access a malicious website that will download malware into the system. While general phishing by definition is done via email, there are tons of variants exploiting different vectors. Usually all of them are called phishing for simplicity but we will see below that the details matter as different attacks require different defenses. It's by far the most popular cyber attack, easy to perform since you don't need much IT background and nevertheless its one of the most dangerous and effective, taking thousands of victims every day. Why? Because it exploits the biggest of the vulnerabilities, the human factor.

Spear Phishing

Unlike generic phishing, that tries to reach as many people as possible focusing on being effective by statistics rather than effort, spear phishing targets a particular victim. The attacker will use OSINT techniques to collect as many intel as possible from the victim, to make the attempts as tailored and convincing as possible, while the goal being the same, making the target click the link and share his credentials.


Whaling

A type of spear phishing focused on high-profile individuals within an organization, often managers, executives and the CEO. Whaling goes directly into the main target, skipping the escalation from easier low-profile victims.


Vishing

Voice phishing, attacker uses voice communication technologies to trick victims into revealing sensitive information, credentials or performing actions that will compromise their security and the company. During the attack the criminal will use various tactics, such as impersonation, to create a sense or urgency or fear, playing mind games and psychology tricks so the target is more likely to comply with the requests.


Smishing

SMS phishing, attacker sends SMS messages containing malicious links or directly asking for the credentials in a manipulative way, tricking the victim into thinking it's the legitimate website sending an SMS. Basically phishing via SMS instead of email.


Pharming

Involves the manipulation of a system DNS settings or the use of spoofing techniques to redirect victims to a fraudulent website without having to click on to a malicious link. It can exploit vulnerabilities in a DNS infrastructure compromising multiple victims or a whole network. When victims navigate to a legit website domain, they will get redirected to a fake version that will steal its credentials. It's very effective since the victim will not suspect as he didn't click any link and is using the system same as always.


Watering Hole Attack

Derived from the analogy of predators waiting near watering holes to attack their prey, is an attack where the actors compromise a website that they know the victim will visit. When the victims visits the website as usual, they get infected with a malicious payload covertly. Although its not phishing in the classic way of tricking the victim into clicking a malicious link, still its more insidious as its based upon a victim clicking a link that's not even manipulated, but the whole website as a collateral victim


Business Email Compromise (BEC)

BEC parts from an already compromised company email account, already from the inside, actors will easily impersonate the user of the account to escalate its way into high-profile accounts or directly steal data.

Last updated 1 year ago

📕