2.2.3. Reverse social engineering
Instead of contacting a potential victim directly, an attacker
can attempt to make them believe that he/she is a trustworthy
entity. The goal is to make potential victims approach him,
e.g., to ask for help. This indirect approach is known as
“
reverse social engineering
”
(
Granger, 2001; Mitnick and Simon,
2002
) and consists of three major parts: sabotage, adver-
tising and assisting (
Nelson, 2008
). The first step in this is
sabotaging the company
'
s computer system. This can range
anywhere from disconnecting someone from the company
'
s
network to sophisticated manipulation of the victim
'
s soft-
ware applications. The attackers then advertise that they can
fix the problem. When the victim asks for help, the social
engineer will resolve the problem they created earlier while,
e.g., asking the victim for their password (
“
so I can fix the
problem
”
) or telling them to install certain software.
2.2.3. Reverse social engineeringInstead of contacting a potential victim directly, an attackercan attempt to make them believe that he/she is a trustworthyentity. The goal is to make potential victims approach him,e.g., to ask for help. This indirect approach is known as“reverse social engineering”(Granger, 2001; Mitnick and Simon,2002) and consists of three major parts: sabotage, adver-tising and assisting (Nelson, 2008). The first step in this issabotaging the company's computer system. This can rangeanywhere from disconnecting someone from the company'snetwork to sophisticated manipulation of the victim's soft-ware applications. The attackers then advertise that they canfix the problem. When the victim asks for help, the socialengineer will resolve the problem they created earlier while,e.g., asking the victim for their password (“so I can fix theproblem”) or telling them to install certain software.
การแปล กรุณารอสักครู่..