From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Introducing social engineering concepts and techniques

Introducing social engineering concepts and techniques

From the course: Certified Ethical Hacker (CEH)

Introducing social engineering concepts and techniques

- Hi, Omar, this is Nick. I'm calling from IT, and we've noticed some suspicious activity on your account. And what I'd like to do is, log into your account at examplecorp.com just to validate that everything is set up properly. I want to make sure that you don't get hacked. So if you wouldn't mind, could you provide me with your password? I have your username, of course, because you know, I work here too, and I have a similar username, so I know your username. I wonder if you wouldn't mind sharing with me your password so I could log in and verify your account. - Absolutely. The password is CEH123. So what you just saw right there is an example of a traditional social engineering campaign, and in this case is vishing because it's actually done over the phone, via a voice call. So unlike technical attacks that exploits system vulnerabilities, social engineering targets the human psychology and the behavior to achieve that malicious objective. So in this case, this is psychological…

Contents