Hello, I am
I was asked to teach a class on Social Engineering for an organization and I quickly wanted to tell you how I got into the building.
I was asked to teach a class on Social Engineering for an organization and I quickly wanted to tell you how I got into the building.
In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today in our final blog post on the structured social engineering process we dive into the attack execution. Patience, young grasshopper One of the hardest things in social engineering is that it is a patience game. You can not make somebody do something. You game is to influence the… Read more Social Engineering Attack Execution →
In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into attack preparation The D20 entropy device An attack preparation is a dry-run of your attack. Before we can do that I would recommend you to invest in a D20 (which can be found in your local board game shop). The D20 is a dice… Read more Social Engineering Attack Preparation →
This post we do OSINT for our target and learn how we can approach our target using DISC.
In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into target profiling $whoami Before you can start target profiling I would recommend you to think about yourself first. It is important to understand yourself well enough before you start with social engineering since you are the tool you will be using. Technology is just… Read more Social-Engineering Target Profiling →
In this post we dive into target selection. Which human will be our target?
In this blogpost we dive into the first step for preparing a social-engineering attack.
Short introduction on the opportunistic and the process-based approach for doing social engineering attacks.