O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Creating Targeted Scenarios

Gavin Watson,    Senior Security Engineer, RandomStorm Limited

Once the objectives have been agreed with the client, the next stage is to design scenarios to meet those objectives. This chapter provides a series of models that testers can use to create effective scenarios that not only meet objectives but also identify multiple vulnerabilities rather than concentrating on a single security flaw. The ultimate purpose of these models is to ensure that assessments provide value to the client and lead to improvements in their security.

Keywords

Social engineering scenarios; target identification; target profiling; physical reconnaissance; pretext design mapping; cover stories; exit strategies

Information in this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required