O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

The Telephone Attack Vector

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Telephone social engineering attacks can be used to gather information about the target company or even trick users into performing actions that lead to a full breach of their security. It is a popular attack vector as there is little risk of being identified and caught. This chapter provides a practical approach to planning the calls that will achieve the assessment objectives, but more importantly, identify the actual vulnerabilities in the target’s policies and procedures.

Keywords

Telephone attack; Caller ID spoofing; phone system hacks

Introduction

People would be forgiven for thinking that phone scams would have died off given the explosive ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required