-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
aaron
committed
Oct 23, 2024
1 parent
95e19e4
commit e231ed9
Showing
3 changed files
with
89 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
--- | ||
title: "What is Phishing?" | ||
author: Aaron Kelly | ||
date: 25-10-2024 | ||
--- |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,84 @@ | ||
--- | ||
|
||
# What is phishing? | ||
|
||
![meme](img/gonePhishing.jpg) | ||
|
||
--- | ||
|
||
# What is phishing? | ||
|
||
Phishing is the primary method of social engineering. | ||
|
||
Often a simple and quick attack vector. | ||
|
||
--- | ||
|
||
# Phishing attack TTPs | ||
|
||
--- | ||
|
||
# Tools | ||
|
||
Will always come through some form of socail medium such as: | ||
|
||
- Text message (Smishing) | ||
- Phone Call (Vishing) | ||
- QR Codes (Quishing) | ||
|
||
--- | ||
|
||
# Tactics | ||
|
||
Phishers will always try and evoke an emotional reaction to their message. | ||
|
||
They will always be time sensitive. | ||
|
||
They will often employ some form of impersonation. | ||
|
||
--- | ||
|
||
# Procedures | ||
|
||
There are further types of phishing that would fall under a procedure such as: | ||
|
||
- Spear phishing | ||
- Whaling | ||
- Angle phishing | ||
|
||
--- | ||
|
||
# How does phishing work? | ||
|
||
Relies on manipulation and feelings over thoughts. | ||
|
||
--- | ||
|
||
# Why does phishing work? | ||
|
||
Humans want to trust each other. | ||
|
||
--- | ||
|
||
<!-- Might have to cut this bit --> | ||
|
||
# Some examples of phishing | ||
|
||
<!-- Really shit one --> | ||
|
||
--- | ||
|
||
<!-- Pretty good one --> | ||
|
||
--- | ||
|
||
<!-- Ransomware Cache attack --> | ||
|
||
--- | ||
|
||
<!-- Extortion --> | ||
|
||
--- | ||
|
||
# Storytime |