0
0
Cybersecurityknowledge~10 mins

Phishing and social engineering in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Phishing and social engineering
Attacker plans attack
Crafts deceptive message
Sends message to target
Target receives message
Target decides to trust?
NoIgnore message
Yes
Target shares sensitive info or clicks link
Attacker gains access or info
Attack success or failure
This flow shows how an attacker creates a fake message to trick a person into giving sensitive info or access, leading to a successful phishing or social engineering attack.
Execution Sample
Cybersecurity
1. Attacker sends fake email pretending to be bank
2. Email asks user to click link and enter password
3. User clicks link and enters password
4. Attacker captures password
5. Attacker uses password to access account
This example traces a phishing attack where a fake email tricks a user into giving their password.
Analysis Table
StepActionTarget's ResponseResult
1Attacker sends fake emailUser receives emailUser sees message from 'bank'
2Email asks for password via linkUser reads emailUser considers if email is real
3User clicks linkBrowser opens fake siteUser sees login page
4User enters passwordPassword sent to attackerAttacker captures password
5Attacker uses passwordAccesses user's bank accountAttack successful
6User ignores emailNo action takenAttack fails
💡 Execution stops when user either shares info (attack success) or ignores message (attack fails)
State Tracker
VariableStartAfter Step 1After Step 3After Step 4Final
User Trust LevelNeutralNeutralTrusted (mistaken)Trusted (mistaken)Compromised
Password SafetySafeSafeSafeExposedCompromised
Attacker AccessNoneNoneNoneNoneGained
Key Insights - 3 Insights
Why does the user trust the fake email?
The email looks like it comes from a trusted source (bank), so the user mistakenly trusts it (see execution_table step 2 and variable_tracker 'User Trust Level' after Step 3).
What happens when the user clicks the link?
Clicking the link opens a fake website controlled by the attacker, which tricks the user into entering their password (execution_table step 3 and 4).
How can the attack be stopped?
If the user ignores the email or verifies its authenticity before acting, the attack fails (execution_table step 6).
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table at step 4, what happens to the password?
AIt is safely stored by the user
BIt is deleted
CIt is sent to the attacker
DIt is encrypted
💡 Hint
Check the 'Result' column at step 4 in execution_table
At which step does the user mistakenly trust the fake message?
AStep 1
BStep 3
CStep 2
DStep 5
💡 Hint
Look at 'User Trust Level' in variable_tracker after Step 3
If the user ignores the email, what is the outcome?
AAttack fails
BUser shares password
CAttack succeeds
DUser clicks link
💡 Hint
See execution_table step 6 and exit_note
Concept Snapshot
Phishing and social engineering involve tricking people into giving sensitive info.
Attackers send fake messages pretending to be trusted sources.
Users may click links or share info, leading to data theft.
Always verify messages before acting to avoid falling victim.
Ignoring suspicious messages stops the attack.
Full Transcript
Phishing and social engineering attacks start when an attacker plans and sends a fake message to a target. The target receives the message and decides whether to trust it. If the target trusts the message, they may share sensitive information or click a malicious link. This allows the attacker to gain access or information, resulting in a successful attack. If the target does not trust the message, they ignore it and the attack fails. For example, an attacker sends a fake email pretending to be a bank, asking the user to enter their password. If the user enters the password, the attacker captures it and accesses the account. Key moments include why users trust fake emails, what happens when they click links, and how ignoring messages stops attacks. Understanding these steps helps protect against phishing and social engineering.