1.Phishing Spear phishing SMS phishing Voice phishing Whaling2.Elicitation Business email compromise3.Interrogation4.Impersonation5.Shoulder surfing6.USB key drop7.Motivation techniques Authority Scarcity Social proof Urgency Likeness Fear Given a scenario, exploit network-based vulnerabilities. 1.Name resolut...
Phishing Spear phishing Impersonation Shoulder surfing Tailgating Dumpster diving 2. DDoS 3. DoS 4. Zero-day 5. On-path attack (previously known as man-in-the-middle attack) 6. Brute force 7. Dictionary 8. Rainbow table 9. Spoofing