Krissie's Blog

April 28th, 2021

Week 8: Social Engineering

Posted by 2101716773krishita in Ethical Hacking & Penetration Testing

the attack process of a social engineering is to :

  • gather intelligence information
  • Identifying vulnerable points
  • Planning the Attack
  • Execution

There are various ways of which one can execute a social engineering attack such as:

  • Impersonation- pretending to be someone else
  • Reciprocation- The art of exchanging favors in terms of getting mutual advantage
  • Influential Authority
  • Scarcity
  • Social Relationship
  • Social Engineering Toolkit (SET)

Leave a reply

:mrgreen: :neutral: :twisted: :shock: :smile: :???: :cool: :evil: :grin: :oops: :razz: :roll: :wink: :cry: :eek: :lol: :mad: :sad:

  • Monthly

  • Meta

    • Subscribe to RSS feed
    • The latest comments to all posts in RSS
    • Subscribe to Atom feed
    • Powered by WordPress; state-of-the-art semantic personal publishing platform.
    • Firefox - Rediscover the web