Social Engineering :–
It is the art of manipulating user of computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.
The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access building or getting the user to installing backdoor software.
Knowing the tricks used by hackers to trick user into releasing vital login information among others is fundamental in protecting computer systems.
Social Engineering Works:–
- Gather Information :-
This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system. - Plan Attack:-
The attacker outline how he intends to execute the attack. - Acquire Tools:-
These include computer programs that an attacker will use when launching the attack. - Attack :-
Exploit the weaknesses in the target system. - Use acquire knowledge :-
Information gathered during the social engineering tactics such as pet names, birth dates of the organization founders etc. is used in attacks such as password guessing.