Chapter 10

The Telephone Attack Vector

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Telephone social engineering attacks can be used to gather information about the target company or even trick users into performing actions that lead to a full breach of their security. It is a popular attack vector as there is little risk of being identified and caught. This chapter provides a practical approach to planning the calls that will achieve the assessment objectives, but more importantly, identify the actual vulnerabilities in the target’s policies and procedures.

Keywords

Telephone attack; Caller ID spoofing; phone system hacks

Introduction

People would be forgiven for thinking that phone scams would have died off given the explosive ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.