You are on page 1of 5

Social Engineering

How Yoong Han


TP038203
UC2F1704IT(ISS)
Ethical Hacking and Incident Response
Introduction

Malicious attack tricking users into giving away


important information
Identify security protocols
Gain victim’s trust in order to gain sensitive
information
Engage their curiosity and engineer them to open
email
SOCIAL ENGINEERING TOOLKIT

Open-source Python
Social-Engineer toolkit(SET) is designed to
perform attacks using an exploitation toolkit.
Used to attack organisations or person during
penetration testing
Designed to protect one of the toughest attacks
in the internet world
Phishing

Acquire information in a way to create curiosity


in within victims
Usually in a form of email or text message
Users will input sensitive information
Attackers attains information
Malware installed once linked is clicked
Prevention

Protecting confidential data


Cyber security assessments from time to
time
Implement a security policy
Double check source

You might also like