Skip to content

Category: Social-Engineering

Social Engineering Attack Execution

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today in our final blog post on the structured social engineering process we dive into the attack execution. Patience, young grasshopper One of the hardest things in social engineering is that it is a patience game. You can not make somebody do something. You game is to influence the… Read more Social Engineering Attack Execution

Social Engineering Attack Preparation

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into attack preparation The D20 entropy device An attack preparation is a dry-run of your attack. Before we can do that I would recommend you to invest in a D20 (which can be found in your local board game shop). The D20 is a dice… Read more Social Engineering Attack Preparation

Social-Engineering Target Profiling

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into target profiling $whoami Before you can start target profiling I would recommend you to think about yourself first. It is important to understand yourself well enough before you start with social engineering since you are the tool you will be using. Technology is just… Read more Social-Engineering Target Profiling