Social Engineering Attacks
AuthorDiscord
  • Hacking Humans
  • 🐟Phishing
    • 🟢Spear Phishing
    • 🟢Vishing
    • 🟢Smishing
    • 🟢Clone Phishing
    • 🟢Link Manipulation
    • 🟢Watering Hole Attack
    • 🟢Business Email Compromise
  • 🎩Pretexting
    • 🟢Tech Support Scam
    • CEO Fraud Scam
    • 🟢Trust Scam
    • Job Scam
    • 🟢Relationship Scam
    • 🟢Charity Scam
    • 🟢Lottery Scam
  • 🛠️Baiting
    • USB Drop
    • Fake Wi-Fi Hotspot
    • Evil Twin Attack
    • QR Code Scam
    • Social Media Scam
    • Free Gift Scam
    • Black Hat SEO
  • 🥨Quid Pro Quo
    • Conference Scam
    • Customer Service Scam
    • Fake Software Scam
    • Social Networking Scam
    • Website Community Scam
    • Alarm System Scam
    • IT Support Scam
  • Tailgating
    • Piggybacking
    • Keylogging
    • Dumpster Diving
    • Shoulder Surfing
    • Eavesdropping
    • Credit Card Skimming
    • Bluetooth Hacking
  • Group 1
    • Presentations
Powered by GitBook
On this page

Was this helpful?

  1. Phishing

Link Manipulation

Link Manipulation Attack

Link manipulation is a security attack where an attacker tricks a user into clicking on a malicious link. This can be done by altering the appearance of a legitimate-looking link, making it point to a different URL that could lead to phishing websites or malware downloads.

Key Characteristics:

  • Uses disguised or misleading links.

  • Often distributed via email or messaging services.

  • Aims to steal sensitive information or deliver malware.

Prevention:

  • Verify the authenticity of links before clicking.

  • Hover over links to see the actual URL.

  • Use security software that can detect and block malicious websites.

PreviousClone PhishingNextWatering Hole Attack

Last updated 1 year ago

Was this helpful?

🐟
🟢