2
Most read
5
Most read
7
Most read
Social Engineering
BY PREM LAMSAL
BSC.CSIT 7TH SEMESTER
31
What is Social Engineering?
• In a security context, Social Engineering can be defined as:
• A combination of social, psychological and information gathering
techniques that are used to manipulate people for nefarious
purposes.
• It target humans rather then technology to exploit weakness in an
organizations security.
• Is the art of manipulating people so they give up confidential
information
• Attacker uses human interaction to obtain or compromises
information
• Tricking people to get information
• Most common type of SE happens over the phone
Social Engineering
Kevin Mitnick - Famous Social Engineer
“People are generally helpful, especially to
someone who is nice, knowledgeable or insister.”
Social Engineering Cycle
Gather
Information
Plan Attack
Acquire toolsAttack
Use acquired
knowledge
Techniques of Social Engineering
• Pretexting
• Phishing
• Vishing
• Baiting
• Quid pro quo
• Diversion Theft
Pretexting
• Creating fake or invented scenario
Phishing
• Obtaining information through
email, websites
• Websites like http://shadowave.co
Sending fake mail to victim
Spear Phishing
• More specific to the victim
• Target individual
Vishing
• Phone Phishing
Baiting
• Using Trojan Horse that uses physical
media and relies on the greed of the
victim
Web Click Baiting
• Something on Internet makes you to
click
Quid pro quo
• Something for something
• Call random numbers at a company, claiming to be from technical
support.
• Eventually, you will reach someone with a legitimate problem
• Grateful you called them back, they will follow your instructions
• The attacker will "help" the user, but will really have the victim type
commands that will allow the attacker to install malware
Diversion Theft
• Divert actual delivery location to
some other place and theft
information.
Weakest Link?
• No matter how strong your:
1. Firewalls
2. Intrusion Detection System
3. Cryptography
4. Antivirus software
• We are the weakest link in computer security !
• People are more vulnerable than computers
General Safety / Prevention
• Before transmitting personal information over the internet, check
the connection is secure and check the URL is correct
• If unsure email message is legitimate, contact the person or
company by another means to verify
• Be aware of excited content on the Internet.
• Making policies to verify different source rather than single source.
Thank you
For more please visit : http://premlamsal.com.np

More Related Content

PPTX
Cyber Security(Password Cracking Presentation).pptx
PPTX
HACKING
PDF
Social engineering
PDF
Unit 3_Private Key Management_Protection.pdf
DOCX
Password Cracking
PPTX
Password Cracking
PPTX
Chapter1 Cyber security Law & policy.pptx
PPTX
Encryption & Decryption
Cyber Security(Password Cracking Presentation).pptx
HACKING
Social engineering
Unit 3_Private Key Management_Protection.pdf
Password Cracking
Password Cracking
Chapter1 Cyber security Law & policy.pptx
Encryption & Decryption

What's hot (20)

PPTX
Password cracking and brute force
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Unit 5_Classification of Cyber Crimes.pdf
PPTX
Detection Rules Coverage
PPTX
Digital forensic tools
PPT
Cloud presentation
PPT
ETHICAL HACKING
PPT
Cryptography - A Brief History
PPTX
Analysis of digital evidence
PPT
Cyber security and emails presentation
PPTX
Digital forensics
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PDF
Unit 2_DES Algorithm_Encryption_Decryption.pdf
PDF
Unit 2_Key distribution_Deffi-Hellman.pdf
PDF
OSINT: Open Source Intelligence - Rohan Braganza
PPTX
Hacking
PPTX
Palmprint recognition presentation
PPTX
Ransomware
PDF
Threat Hunting with Splunk Hands-on
PPTX
Ethical Hacking - sniffing
Password cracking and brute force
CRYPTOGRAPHY AND NETWORK SECURITY
Unit 5_Classification of Cyber Crimes.pdf
Detection Rules Coverage
Digital forensic tools
Cloud presentation
ETHICAL HACKING
Cryptography - A Brief History
Analysis of digital evidence
Cyber security and emails presentation
Digital forensics
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 2_Key distribution_Deffi-Hellman.pdf
OSINT: Open Source Intelligence - Rohan Braganza
Hacking
Palmprint recognition presentation
Ransomware
Threat Hunting with Splunk Hands-on
Ethical Hacking - sniffing
Ad

Similar to Introduction to Social engineering | Techniques of Social engineering (20)

PPTX
Social engineering
PDF
Social Engineering Basics
PPTX
Cyber Security PPT and how to be aware from hackers
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Introduction to Cybersecurity - Secondary School_0.pptx
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Week 2 - Social Engineering attacks.pptx
PDF
Social Engineering.pdf
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PPTX
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
PPTX
Unit iii: Common Hacking Techniques
PPTX
Cyber Crime And Cyber Safety Project.pptx
PPTX
ETHICAL HACKING
PPT
Social Engineering
PPT
Social engineering
PPTX
Cybercrimes and Cybercriminals
PPT
Computer security
PPTX
Amir bouker
PDF
- Social Engineering Unit- II Part- I.pdf
PPTX
computer law.pptx
Social engineering
Social Engineering Basics
Cyber Security PPT and how to be aware from hackers
Cyber Security Awareness Session for Executives and Non-IT professionals
Introduction to Cybersecurity - Secondary School_0.pptx
Social engineering-Attack of the Human Behavior
Week 2 - Social Engineering attacks.pptx
Social Engineering.pdf
Unveiling the dark web. The importance of your cybersecurity posture
Nep bnu bca unit 2: Cyber Crimes and Cyber Law.pptx
Unit iii: Common Hacking Techniques
Cyber Crime And Cyber Safety Project.pptx
ETHICAL HACKING
Social Engineering
Social engineering
Cybercrimes and Cybercriminals
Computer security
Amir bouker
- Social Engineering Unit- II Part- I.pdf
computer law.pptx
Ad

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
STKI Israel Market Study 2025 version august
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Tartificialntelligence_presentation.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Architecture types and enterprise applications.pdf
1 - Historical Antecedents, Social Consideration.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Group 1 Presentation -Planning and Decision Making .pptx
A review of recent deep learning applications in wood surface defect identifi...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Unlock new opportunities with location data.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Getting Started with Data Integration: FME Form 101
Web Crawler for Trend Tracking Gen Z Insights.pptx
Hindi spoken digit analysis for native and non-native speakers
August Patch Tuesday
NewMind AI Weekly Chronicles – August ’25 Week III
Tartificialntelligence_presentation.pptx
What is a Computer? Input Devices /output devices
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

Introduction to Social engineering | Techniques of Social engineering

  • 1. Social Engineering BY PREM LAMSAL BSC.CSIT 7TH SEMESTER 31
  • 2. What is Social Engineering? • In a security context, Social Engineering can be defined as: • A combination of social, psychological and information gathering techniques that are used to manipulate people for nefarious purposes. • It target humans rather then technology to exploit weakness in an organizations security.
  • 3. • Is the art of manipulating people so they give up confidential information • Attacker uses human interaction to obtain or compromises information • Tricking people to get information • Most common type of SE happens over the phone Social Engineering
  • 4. Kevin Mitnick - Famous Social Engineer “People are generally helpful, especially to someone who is nice, knowledgeable or insister.”
  • 5. Social Engineering Cycle Gather Information Plan Attack Acquire toolsAttack Use acquired knowledge
  • 6. Techniques of Social Engineering • Pretexting • Phishing • Vishing • Baiting • Quid pro quo • Diversion Theft
  • 7. Pretexting • Creating fake or invented scenario
  • 8. Phishing • Obtaining information through email, websites • Websites like http://shadowave.co Sending fake mail to victim
  • 9. Spear Phishing • More specific to the victim • Target individual Vishing • Phone Phishing
  • 10. Baiting • Using Trojan Horse that uses physical media and relies on the greed of the victim Web Click Baiting • Something on Internet makes you to click
  • 11. Quid pro quo • Something for something • Call random numbers at a company, claiming to be from technical support. • Eventually, you will reach someone with a legitimate problem • Grateful you called them back, they will follow your instructions • The attacker will "help" the user, but will really have the victim type commands that will allow the attacker to install malware
  • 12. Diversion Theft • Divert actual delivery location to some other place and theft information.
  • 13. Weakest Link? • No matter how strong your: 1. Firewalls 2. Intrusion Detection System 3. Cryptography 4. Antivirus software • We are the weakest link in computer security ! • People are more vulnerable than computers
  • 14. General Safety / Prevention • Before transmitting personal information over the internet, check the connection is secure and check the URL is correct • If unsure email message is legitimate, contact the person or company by another means to verify • Be aware of excited content on the Internet. • Making policies to verify different source rather than single source.
  • 15. Thank you For more please visit : http://premlamsal.com.np

Editor's Notes

  • #12: Randomly call garni company ma like for technical support and reach someone with legitamite problem, they will be grateful that you called them back, they will follow your instruction. The attacker will help the user but will really have the victim type command that will alow the attacker to install malware.