SlideShare a Scribd company logo
Friendly Tip: Please take notes to better remember concepts
In the following slides
we will learn what
Social Engineering
Attacks are & the
Principles used to
carry out such attacks
Core Cyber Security Concepts
Social Engineering Attacks :
" It's the Art of manipulating people, to
give up confidential information/resources "
Such attacks are a very low tech form of a
security attack. In fact, it doesn’t
necessarily require tech expertise at all. It
involves attacker or a group of attackers
and the target organization/victim.
The attackers try to manipulate the target
& gain access to sensitive information or
resources using social engineering
techniques.
Social Engineering Attacks :
Social engineering may involve one or more persons trying to gain
access to sensitive information, In groups The attackers work
together try to create a situation to manipulate the target into giving
up info such as credentials or resources such as money.
Social Engineering Attacks :
They’re all coordinating their efforts and
hoping that you’ll lower your guard and grant
them access to anything that they might need.
Social Engineering Attacks rely on Deceit &
manipulation.
There are a number of
principles associated with
social engineering attacks.
When these principles are
combined and used
effectively, the social
engineering attacks have a
higher chance of success.
Social Engineering Principles:
Social Engineering Principles:
We'll start with 'Authority'. Humans tend to cooperate and listen to
authority figures and attackers who use social engineer often rely on
this principle.
-> Authority
The attacker contacts the unsuspecting victim
claim that they're from the tax department and
states that the target owes taxes, the attacker
continues to state that evading tax is a criminal
offense and threatens the target with jail time.
By pretending to be an authority figure, the
attacker tries to scare the victim, to put
pressure on the victim and cause panic.
Panicked individuals don't think straight &
the attacker uses this to their advantage.
When the victim is unable to think straight,
The attacker presents a " Solution "
Social Engineering Principles:
-> Authority
Social Engineering Principles:
-> Authority
The attacker claims that the victim looks like
they made a honest mistake and assures
that they'll take care of the "issue" but only
if the victim immediately clears the "dues"
If the victim isn't compliant, they'll threaten
with legal action & jail time to coerce the
victim into paying the money.
Social Engineering Principles:
If the victim believes the attacker,
they will transfer the money.
In the upcoming slides we'll be
discussing how other social
engineering principles compliment
this attack, to make it more
successful.
Social Engineering Principles:
-> Social Proof
It's also known as consensus. They try to use
the names of people you know or private data
to come up with a believable story to convince
you to justify carrying out their request.
Based on the previous example, the attacker
might use leaked tax ID number as social
proof to present themselves as a more
legitimate entity.
Social Engineering Principles:
-> Urgency
If the person doing the social
engineering can inject some type
of urgency, then they can make
things move even faster. This
needs to happen quickly. Don’t
even think about it. Just provide
this information right now so that
we can solve this problem.
Social Engineering Principles:
-> Urgency
They create the need to act urgently, to
defuse a ticking time bomb by acting
now. They force the panicked victim to
comply immediately or face severe
consequences for not complying.
They use this to prevent the target
from acting in a rational manner.
Social Engineering Principles:
-> Scarcity
Social engineers also like to have a
clock that’s ticking. There needs to
be scarcity. This particular situation
is only going to be this way for a
certain amount of time, we have to
be able to resolve this issue before
this timer expires.
Social Engineering Principles:
-> Scarcity
The attackers might call the unsuspecting
victim & tell the victim that they're from a
finance company and as part of their
marketing campaign, they claim that the
target won a lucky draw and that they're
eligible for a 80% discount on a car of
their choosing.
However attackers claim that offer wont
last long & there are many eager
customers on the line. As a solution to
this problem, to confirm the purchase,
the attacker asks to pay a 10 % token
amount in advance & assures that
they'll be sent a receipt. If the victim
believes this is real, they will lose their
money.
Social Engineering Principles:
-> Scarcity
Social Engineering Principles:
-> Familiarity
Another technique that they use is
one of familiarity. They become your
friend. They talk about things that
you like, and by doing that, they
make the target feel like the attacker
can be trusted. They use this trust to
make the victim do things for them.
Honey Trap attacks work on this
principle.
Types of Social Engineering Attacks
Based on the principles we
discussed, the attacker tries to
incorporate them into their
preferred type of social
engineering attacks . We'll be
what are the different types of
social enginnering attacks in the
upcoming slides.
Types of Social Engineering Attacks
Phishing
Phishing is one of the most
popular Social Engineering
Attacks. The attacker sends a fake
email to steal from victims.
Spear-phishing is a targeted attack where criminals disguise themselves as
legitimate sources to convince specific victims to give up confidential info or
steal money.
Spear Phishing
The credential harvester attack method is used when you don’t want to
specifically get a shell but perform phishing attacks in order to obtain
usernames and passwords from the system.
In this attack vector, a website will be
cloned, and when the victim enters the
user credentials, the usernames and
passwords will be posted back to your
machine and then the victim will be
redirected back to the legitimate site.
Baiting
Baiting is one the most common and
simplest social engineering attacks. IT is
similar to phishing attacks, baiting uses
false promises to lure unsuspecting
victims to give up sensitive info or
download malicious files.
Examples of this include : Free video game downloads redirecting
victims to download malicious files
DNS Spoofing
DNS spoofing, also known as DNS
cache poisoning is an attack where
the attacker uses a fake website
and redirects to this fake website
to steal data.
The victim believes he's accessing
the legitimate site and proceeds to
reveal credentials, which'll be
captured by the attacker.
Honey Trap
It's a social engineering attack that uses sexual relationships to
lure victim into divulging critical information.
Tailgating
Tailgating is a physical security
breach where an attacker
follows an authorized person
into a restricted area.
Piggy Backing
In this scenario attacker comes up with a convincing story to let the
employee/victim gain access to restricted area. the attacker might
claim he/she/they works there, and forgot ID at home and are late
for meeting inorder to convince the employee to use keycard to let
attacker into premises
Shoulder Surfing
The attacker stays close to you &
tries to observe you while typing a
password or a PIN.
Lunch time attacks
Attacker phsycially
gains access to an
unsecured device when
employee is on a break.
Pretexting/ Impersonation
In Pretetexting, Cyber criminals
impersonate someone else and
come up with convincing
scenarios to manipulate the
victim into giving up sensitive
information , transfer money or
grant access to private
networks.
Sources :
https://www.professormesser.com/security-plus/sy0-
501/principles-of-social-engineering/
https://medium.com/@kaviru.mihisara/credential-harvester-
attack-73335c4a5bb8

More Related Content

PDF
Social engineering attacks
PPTX
Social Engineering new.pptx
PDF
Social Engineering.pdf
PPTX
Social engineering
PPTX
Social Engineering,social engeineering techniques,social engineering protecti...
PPTX
Phishing attack seminar presentation
PPTX
Social engineering
PPT
Employee Security Training[1]@
Social engineering attacks
Social Engineering new.pptx
Social Engineering.pdf
Social engineering
Social Engineering,social engeineering techniques,social engineering protecti...
Phishing attack seminar presentation
Social engineering
Employee Security Training[1]@

What's hot (20)

PPTX
What is Ransomware
PPTX
Threat hunting for Beginners
PDF
Threat Intelligence
PDF
Overview of the Cyber Kill Chain [TM]
PDF
Threat Hunting
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPT
Introduction to Web Application Penetration Testing
PDF
Social engineering
PPTX
Social Engineering
PDF
MITRE ATT&CK Framework
PDF
Ceh v5 module 09 social engineering
PPTX
WannaCry ransomware attack
PDF
Information Security Awareness for everyone
PPTX
Network Security and Firewall
PPTX
Phishing ppt
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Data breach presentation
PPTX
Hyphenet Security Awareness Training
PPT
Social Engineering | #ARMSec2015
What is Ransomware
Threat hunting for Beginners
Threat Intelligence
Overview of the Cyber Kill Chain [TM]
Threat Hunting
Presentation of Social Engineering - The Art of Human Hacking
Introduction to Web Application Penetration Testing
Social engineering
Social Engineering
MITRE ATT&CK Framework
Ceh v5 module 09 social engineering
WannaCry ransomware attack
Information Security Awareness for everyone
Network Security and Firewall
Phishing ppt
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Cybersecurity 1. intro to cybersecurity
Data breach presentation
Hyphenet Security Awareness Training
Social Engineering | #ARMSec2015
Ad

Similar to Social Engineering Attacks & Principles (20)

PPTX
Social engineering presentation
PPTX
Social Engineering
PPTX
The Art of Human Hacking : Social Engineering
PDF
Why is cybersecurity important for the entertainment industry
PPTX
Data security concepts chapter 2
PPTX
Social engineering: A Human Hacking Framework
PPTX
PDF
Unlocking the Hidden Potential
PPSX
Social Engineering - Are You Protecting Your Data Enough?
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPT
Social Engineering: "The Cyber-Con"
PPTX
Cybersecurity Social Engineering Tactics & Mitigation Strategies
PDF
National Life IT Department's Cyber Security Awareness Presentation
PPTX
Social engineering hacking attack
DOCX
Learn About Social Engineering Services - Aardwolf Security
PPTX
Week 2 - Social Engineering attacks.pptx
PDF
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
DOCX
social engineering attacks.docx
PDF
Puna 2015
PPTX
Ethical Hacking & Network Security
Social engineering presentation
Social Engineering
The Art of Human Hacking : Social Engineering
Why is cybersecurity important for the entertainment industry
Data security concepts chapter 2
Social engineering: A Human Hacking Framework
Unlocking the Hidden Potential
Social Engineering - Are You Protecting Your Data Enough?
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Social Engineering: "The Cyber-Con"
Cybersecurity Social Engineering Tactics & Mitigation Strategies
National Life IT Department's Cyber Security Awareness Presentation
Social engineering hacking attack
Learn About Social Engineering Services - Aardwolf Security
Week 2 - Social Engineering attacks.pptx
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
social engineering attacks.docx
Puna 2015
Ethical Hacking & Network Security
Ad

More from LearningwithRayYT (11)

PDF
Types of Threat Actors and Attack Vectors
PDF
Contrast & Compare & Contrast Information Security Roles
PDF
Compare and Contrast Security Controls and Framework Types
PDF
Identity Management Controls.pdf
PDF
Security concerns regarding Vulnerabilities
PDF
Commands used in Assessing Network layout & Security
PDF
Implementing Account Policies & Authorization Solutions
PDF
Vulnerability Scanning Techniques and Vulnerability scores & exposures
PDF
Threat Intelligence & Threat research Sources
PDF
Application Attacks & Application Layer Attacks
PDF
Malware and Types of malwares.pdf
Types of Threat Actors and Attack Vectors
Contrast & Compare & Contrast Information Security Roles
Compare and Contrast Security Controls and Framework Types
Identity Management Controls.pdf
Security concerns regarding Vulnerabilities
Commands used in Assessing Network layout & Security
Implementing Account Policies & Authorization Solutions
Vulnerability Scanning Techniques and Vulnerability scores & exposures
Threat Intelligence & Threat research Sources
Application Attacks & Application Layer Attacks
Malware and Types of malwares.pdf

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PDF
System and Network Administration Chapter 2
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
AI in Product Development-omnex systems
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
medical staffing services at VALiNTRY
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
top salesforce developer skills in 2025.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Digital Strategies for Manufacturing Companies
System and Network Administration Chapter 2
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
AI in Product Development-omnex systems
Which alternative to Crystal Reports is best for small or large businesses.pdf
Odoo POS Development Services by CandidRoot Solutions
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Navsoft: AI-Powered Business Solutions & Custom Software Development
Operating system designcfffgfgggggggvggggggggg
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
medical staffing services at VALiNTRY
Understanding Forklifts - TECH EHS Solution
ManageIQ - Sprint 268 Review - Slide Deck
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Odoo Companies in India – Driving Business Transformation.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
top salesforce developer skills in 2025.pdf
L1 - Introduction to python Backend.pptx
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

Social Engineering Attacks & Principles

  • 1. Friendly Tip: Please take notes to better remember concepts In the following slides we will learn what Social Engineering Attacks are & the Principles used to carry out such attacks Core Cyber Security Concepts
  • 2. Social Engineering Attacks : " It's the Art of manipulating people, to give up confidential information/resources "
  • 3. Such attacks are a very low tech form of a security attack. In fact, it doesn’t necessarily require tech expertise at all. It involves attacker or a group of attackers and the target organization/victim. The attackers try to manipulate the target & gain access to sensitive information or resources using social engineering techniques. Social Engineering Attacks :
  • 4. Social engineering may involve one or more persons trying to gain access to sensitive information, In groups The attackers work together try to create a situation to manipulate the target into giving up info such as credentials or resources such as money. Social Engineering Attacks : They’re all coordinating their efforts and hoping that you’ll lower your guard and grant them access to anything that they might need. Social Engineering Attacks rely on Deceit & manipulation.
  • 5. There are a number of principles associated with social engineering attacks. When these principles are combined and used effectively, the social engineering attacks have a higher chance of success. Social Engineering Principles:
  • 6. Social Engineering Principles: We'll start with 'Authority'. Humans tend to cooperate and listen to authority figures and attackers who use social engineer often rely on this principle. -> Authority The attacker contacts the unsuspecting victim claim that they're from the tax department and states that the target owes taxes, the attacker continues to state that evading tax is a criminal offense and threatens the target with jail time.
  • 7. By pretending to be an authority figure, the attacker tries to scare the victim, to put pressure on the victim and cause panic. Panicked individuals don't think straight & the attacker uses this to their advantage. When the victim is unable to think straight, The attacker presents a " Solution " Social Engineering Principles: -> Authority
  • 8. Social Engineering Principles: -> Authority The attacker claims that the victim looks like they made a honest mistake and assures that they'll take care of the "issue" but only if the victim immediately clears the "dues" If the victim isn't compliant, they'll threaten with legal action & jail time to coerce the victim into paying the money.
  • 9. Social Engineering Principles: If the victim believes the attacker, they will transfer the money. In the upcoming slides we'll be discussing how other social engineering principles compliment this attack, to make it more successful.
  • 10. Social Engineering Principles: -> Social Proof It's also known as consensus. They try to use the names of people you know or private data to come up with a believable story to convince you to justify carrying out their request. Based on the previous example, the attacker might use leaked tax ID number as social proof to present themselves as a more legitimate entity.
  • 11. Social Engineering Principles: -> Urgency If the person doing the social engineering can inject some type of urgency, then they can make things move even faster. This needs to happen quickly. Don’t even think about it. Just provide this information right now so that we can solve this problem.
  • 12. Social Engineering Principles: -> Urgency They create the need to act urgently, to defuse a ticking time bomb by acting now. They force the panicked victim to comply immediately or face severe consequences for not complying. They use this to prevent the target from acting in a rational manner.
  • 13. Social Engineering Principles: -> Scarcity Social engineers also like to have a clock that’s ticking. There needs to be scarcity. This particular situation is only going to be this way for a certain amount of time, we have to be able to resolve this issue before this timer expires.
  • 14. Social Engineering Principles: -> Scarcity The attackers might call the unsuspecting victim & tell the victim that they're from a finance company and as part of their marketing campaign, they claim that the target won a lucky draw and that they're eligible for a 80% discount on a car of their choosing.
  • 15. However attackers claim that offer wont last long & there are many eager customers on the line. As a solution to this problem, to confirm the purchase, the attacker asks to pay a 10 % token amount in advance & assures that they'll be sent a receipt. If the victim believes this is real, they will lose their money. Social Engineering Principles: -> Scarcity
  • 16. Social Engineering Principles: -> Familiarity Another technique that they use is one of familiarity. They become your friend. They talk about things that you like, and by doing that, they make the target feel like the attacker can be trusted. They use this trust to make the victim do things for them. Honey Trap attacks work on this principle.
  • 17. Types of Social Engineering Attacks Based on the principles we discussed, the attacker tries to incorporate them into their preferred type of social engineering attacks . We'll be what are the different types of social enginnering attacks in the upcoming slides.
  • 18. Types of Social Engineering Attacks Phishing Phishing is one of the most popular Social Engineering Attacks. The attacker sends a fake email to steal from victims. Spear-phishing is a targeted attack where criminals disguise themselves as legitimate sources to convince specific victims to give up confidential info or steal money. Spear Phishing
  • 19. The credential harvester attack method is used when you don’t want to specifically get a shell but perform phishing attacks in order to obtain usernames and passwords from the system. In this attack vector, a website will be cloned, and when the victim enters the user credentials, the usernames and passwords will be posted back to your machine and then the victim will be redirected back to the legitimate site.
  • 20. Baiting Baiting is one the most common and simplest social engineering attacks. IT is similar to phishing attacks, baiting uses false promises to lure unsuspecting victims to give up sensitive info or download malicious files. Examples of this include : Free video game downloads redirecting victims to download malicious files
  • 21. DNS Spoofing DNS spoofing, also known as DNS cache poisoning is an attack where the attacker uses a fake website and redirects to this fake website to steal data. The victim believes he's accessing the legitimate site and proceeds to reveal credentials, which'll be captured by the attacker.
  • 22. Honey Trap It's a social engineering attack that uses sexual relationships to lure victim into divulging critical information.
  • 23. Tailgating Tailgating is a physical security breach where an attacker follows an authorized person into a restricted area. Piggy Backing In this scenario attacker comes up with a convincing story to let the employee/victim gain access to restricted area. the attacker might claim he/she/they works there, and forgot ID at home and are late for meeting inorder to convince the employee to use keycard to let attacker into premises
  • 24. Shoulder Surfing The attacker stays close to you & tries to observe you while typing a password or a PIN. Lunch time attacks Attacker phsycially gains access to an unsecured device when employee is on a break.
  • 25. Pretexting/ Impersonation In Pretetexting, Cyber criminals impersonate someone else and come up with convincing scenarios to manipulate the victim into giving up sensitive information , transfer money or grant access to private networks.