In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into attack preparation The D20 entropy device An attack preparation is a dry-run of your attack. Before we can do that I would recommend you to invest in a D20 (which can be found in your local board game shop). The D20 is a dice… Read more Social Engineering Attack Preparation →
This post we do OSINT for our target and learn how we can approach our target using DISC.
In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into target profiling $whoami Before you can start target profiling I would recommend you to think about yourself first. It is important to understand yourself well enough before you start with social engineering since you are the tool you will be using. Technology is just… Read more Social-Engineering Target Profiling →
In this post we dive into target selection. Which human will be our target?
In this blogpost we dive into the first step for preparing a social-engineering attack.
Short introduction on the opportunistic and the process-based approach for doing social engineering attacks.
Short and final write up for the last day of BruCon 2018,
wrap up for one of the workshop rooms for day 2