-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Art of Social Engineering
By :

This is a lesser-known type of attack where an attacker offers something of value, such as a gift, discount, trip, or other benefits to the victim, in exchange for sensitive information or personal data. This is why this attack is also called favor to favor.
Let’s review the most common types of quid pro quo attacks and tactics.
Free tech support is a quid pro quo attack where an attacker impersonates a technology support company offering free services. Once the user agrees to the free service, the attackers request remote access to the victim’s device. Once it is granted, the attackers will either deploy malware (such as ransomware), exfiltrate sensitive data, or even install a backdoor to gain further access to the corporate network.
Free software to download is a quid pro quo attack where the attackers offer a free software download or a license of common or expensive software. There are several...
Change the font size
Change margin width
Change background colour