Skip to main content

Social Engineering & Phishing

Introduction to Social Engineering

Social engineering is the part of cybersecurity course and  art of manipulating people into divulging confidential information or performing actions that compromise security. It exploits human psychology rather than technical vulnerabilities.


Why It Works

- 98% of cyberattacks involve social engineering (IBM)

- Humans are the weakest link in security

- Low-cost, high-reward for attackers


Types of Social Engineering Attacks in cybersecurity 

1. Phishing (Most Common)

- Deceptive emails/messages pretending to be legitimate

- Goals: Steal credentials, spread malware, financial fraud

Types:

  - Email phishing (Fake invoices, "urgent" requests)

  - Spear phishing (Targeted at individuals)

  - Whaling (Targets executives)

  - Smishing (SMS phishing)

  - Vishing (Voice call phishing)


2. Pretexting

- Creating a fabricated scenario to obtain information

- Example: "IT support" calling to "verify your password"


3. Baiting

- Offering something enticing (free software, USB drops)

- Often contains malware


4. Quid Pro Quo

- "Exchange" of services (e.g., "free tech support" for login details)


5. Tailgating/Piggybacking

- Physically following someone into restricted areas


Phishing: Step-by-Step Attack Breakdown in cybersecurity course

Phase 1: Reconnaissance

- Research targets (LinkedIn, company website)

- Gather emails (Hunter.io, phonebook)

- Study communication style


Phase 2: Crafting the Attack

A. Email Phishing Example

html

From: "Amazon Support" <support@amazon-security.com>

Subject: Urgent: Unusual Login Attempt


Dear Customer,


We detected a login from Nigeria (IP: 196.xxx.xxx). 

Click here to verify your account: http://amazon-verify.com/login


- Amazon Security Team        


Red Flags:

- Fake domain (`amazon-verify.com`)

- Urgency + fear tactics

- Suspicious link


B. Clone Phishing

1. Hack a real email thread

2. Replace attachments/links with malicious ones


Phase 3: Delivery

- Send via email, SMS, or social media

- Use URL shorteners (bit.ly) to hide malicious links

- Spoof sender addresses (Easy with SMTP)


Phase 4: Exploitation

- Fake login pages (Steal credentials)

- Malware downloads (RATs, keyloggers)

- Financial scams (Gift cards, wire transfers)


Phase 5: Post-Attack

- Cover tracks (Delete logs)

- Sell data on dark web

- Use credentials for further attacks


Tools Used in Phishing

| Tool | Purpose |

|------|---------|

|    Gophish    | Open-source phishing framework |

|  SET (Social Engineer Toolkit)  | Automated phishing attacks |

|   King Phisher  | Realistic phishing campaigns |

|   Evilginx2        | Advanced phishing (MFA bypass) |

|  GoPhish           | Email template cloning |


How to Defend Against Social Engineering For Individuals:

✔ Verify sender emails (Check domain spelling)  

✔ Hover over links before clicking  

✔ Enable MFA (Blocks 99% of phishing)  

✔ Don’t trust urgency/fear messages  

✔ Report suspicious emails to IT  


For Organizations:

✔ Employee training (Phishing simulations)  

✔ Email filtering (Mimecast, Proofpoint)  

✔ DMARC/DKIM/SPF (Prevent email spoofing)  

✔ Web filtering (Block malicious sites)  

✔ Incident response plan  


Ethical Phishing Testing in cybersecurity course

Steps for Legal Phishing Tests:

1. Get written permission  

2. Use simulated domains (e.g., `company-security-test.com`)  

3. Provide training after tests  

4. Never steal real data  


Tools for Security Awareness:

- KnowBe4 (Phishing simulations)  

- PhishMe (Now Cofense)  

- Microsoft Attack Simulator  


Real-World Case Studies

1. 2016 DNC Hack (Russian spear phishing)  

2. Twitter Bitcoin Scam  (Celebrity accounts hacked via vishing)  

3. Colonial Pipeline Attack (Compromised VPN via leaked password)  


Conclusion

- Social engineering exploits human trust  and best part of cybersecurity course

- Phishing is the #1 attack vector (FBI IC3 Report)  

- Defense requires awareness + technology  


🔹 Next Steps:

Module 10: Cloud Security & IoT Hacking   

- Try ethical phishing labs (TryHackMe)  

- Learn OSINT techniques for reconnaissance  

- Explore dark web monitoring tools  


🚀 Want a hands-on phishing lab walkthrough? Let me know!  


Comments

Popular posts from this blog

Bug Bounty Hunter – The Professional Vulnerability Hunter

A Bug Bounty Hunter is a cybersecurity researcher who finds and reports security flaws in websites, apps, and systems in exchange for cash rewards (bounties) from companies like Google , Facebook , and Uber.  💰 How Bug Bounties Work    1. Target Selection – Choose a program (e.g., HackerOne, Bugcrowd).   2. Recon & Testing – Hunt for vulnerabilities (e.g., SQLi, XSS, RCE).   3. Submit a Report – Document the bug with PoC (Proof of Concept).   4. Get Paid – Rewards range from  $50 to $500,000+ per bug.   🔥 Top Bug Bounty Platforms  |    Platform     |     Popular Programs   |    Avg. Payout |   |-------------|---------------------|------------|   |    HackerOne   | Uber, Twitter, GitHub | $500–$20K |   |     Bugcrowd    | AWS, Tesla, Cisco | $300–$15K |   |    Intigriti...

Vulnerability Assessor – The Proactive Security Specialist

A Vulnerability Assessor is a cybersecurity professional who identifies, classifies, and prioritizes security weaknesses in systems, networks, and applications before attackers exploit them. Unlike penetration testers (who exploit flaws), assessors focus on discovery and risk analysis.  🔍 Core Responsibilities 1. Vulnerability Scanning       - Run automated scans (Nessus, Qualys, OpenVAS).      - Identify CVEs, misconfigurations, and outdated software.   2. Risk Assessment & Prioritization       - Rate vulnerabilities using CVSS scores.      - Focus on critical risks (e.g., RCE, SQLi).   3. Compliance Auditing     - Check adherence to PCI DSS, HIPAA, NIST.   4. Reporting & Remediation Guidance    - Provide actionable fixes (patching, hardening).  🛠️ Key Tools & Technologies |    Category       |...

Red Teamer – The Elite Offensive Security Role

A Red Teamer is an advanced cybersecurity professional who simulates real-world attacks like advanced threat actors (APT groups, nation-states) to test an organization's defenses. Unlike penetration testers (who focus on finding vulnerabilities), Red Teams emulate stealthy, targeted attacks to evade detection.   🔥 Core Responsibilities   1. Adversary Emulation    - Mimic real APTs (MITRE ATT&CK framework).      - Use custom malware, C2 frameworks (Cobalt Strike, Sliver).   2. Physical & Social Engineering      - Phishing, USB drops, impersonation attacks.   3. Evasion & Lateral Movement      - Bypass EDR/XDR, AV, and SIEM detection.      - Privilege escalation, domain persistence.   4. Reporting & Purple Teaming      - Help Blue Team improve detection rules.  🛠️ Top Red Team Tools |   Category...