Quiz 3
Social Engineering attacks can be automated.
True
This type of analysis is done by running the program to see what it does and to observe its behavior.
Dynamic Analysis
This is the process of acquiring network traffic that is addressed to systems other than your own.
Packet Capturing
This can be part of a payload of virus or worm. It can also be installed by another type of malware and has C&C functionality.
Botnet
This Social Engineering Vector is based on the idea of baiting someone for information. This is a technique used to acquire information through deception using electronic communications such as email.
Phising
This malware type has the ability to identify a program to infect and also copy itself into that program. It is said to have the same phases as its biological counterpart.
Virus
This is the most effective way to see what a program is going to do, short of running it. Essentially it allows you to look at the source code.
Disassembly
This type of attack has been around probably as long as humans themselves. It is the art of manipulating someone into doing something via influence.
Social Engineering
This is a GUI-based packet capture program that is quite popular, and intuitive and does come with command line enhancements. It also gives the user the ability to easily scroll through the list of all frames captured.
Wireshark