Information Gathering

A social engineering attack takes the path arrived at after the evaluation of information known about the target. Therefore, the tactics learned in the preceding chapters will be applied depending on the results of this chapter. However, information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data gathering, no piece of data is said to be irrelevant. Just a small bit of information, such as a target's favorite joint, might be sufficient to enable ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.