O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

The E-mail Attack Vector

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Phishing attacks are very popular for a reason, they work. RSA, one of the world’s leading Information Security organizations, was successfully breached in 2011 by exactly this kind of attack. This chapter will walk through the process and tools involved in creating a successful phishing attack as a part of a social engineering assessment, with a view to improving your client’s defenses.

Keywords

Phishing attacks; spear phishing; client side attack

Introduction

In Chapter 8, the topic of leveraging open source intelligence to augment our assessment was discussed. This included the harvesting of corporate e-mail addresses to use in our attacks. In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required