O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Leveraging Open-Source Intelligence

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

The old saying “If I had eight hours to chop down a tree, I’d spend six sharpening my axe” could not relate more perfectly to this phase. The reconnaissance work you perform will make or break a social engineering engagement. It will truly form the foundations of any work that follows it. There is a wealth of information at our fingertips. This chapter will show you how to find and manipulate it to aid in your assessment. Harvesting e-mail addresses, document metadata, corporate websites, and social media will all be covered.

Keywords

Passive Spider; FOCA; Metagoofil; photographic metadata; Exiftool; image picker; Wget; GeoSetter; reverse ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required