misp-taxonomies/social-engineering-attack-v.../machinetag.json

105 lines
2.4 KiB
JSON
Raw Normal View History

{
"version": 1,
"description": "Attack vectors used in social engineering as described in 'A Taxonomy of Social Engineering Defense Mechanisms' by Dalal Alharthi and others.",
"expanded": "Social Engineering Attack Vectors",
"namespace": "social-engineering-attack-vectors",
"exclusive": false,
"predicates": [
{
"value": "technical",
"expanded": "Technical"
},
{
"value": "non-technical",
"expanded": "Non-technical"
}
],
"values": [
{
"predicate": "technical",
"entry": [
{
"value": "vishing",
"expanded": "Vishing"
},
{
"value": "spear-phishing",
"expanded": "Spear phishing"
},
{
"value": "interesting-software",
"expanded": "Interesting software"
},
{
"value": "baiting",
"expanded": "Baiting"
},
{
"value": "waterholing",
"expanded": "Waterholing"
},
{
"value": "phishing-and-trojan-email",
"expanded": "Phishing and Trojan email"
},
{
"value": "spam-email",
"expanded": "Spam Email"
},
{
"value": "popup-window",
"expanded": "Popup Window"
},
{
"value": "tailgating",
"expanded": "Tailgating"
}
]
},
{
"predicate": "non-technical",
"entry": [
{
"value": "pretexting-impersonation",
"expanded": "Pretexting/Impersonation"
},
{
"value": "hoaxing",
"expanded": "Hoaxing"
},
{
"value": "authoritative-voice",
"expanded": "Authoritative voice"
},
{
"value": "technical-expert",
"expanded": "Technical expert"
},
{
"value": "smudge-attack",
"expanded": "Smudge Attack"
},
{
"value": "dumpser-diving",
"expanded": "Dumpster Diving"
},
{
"value": "shoulder-surfing",
"expanded": "Shoulder surfing"
},
{
"value": "spying",
"expanded": "Spying"
},
{
"value": "support-staff",
"expanded": "Support staff"
}
]
}
],
"refs": [
"https://www.researchgate.net/publication/339224082_A_Taxonomy_of_Social_Engineering_Defense_Mechanisms"
]
}