Announcement

Collapse
No announcement yet.

Social Engineering - Phases

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Social Engineering - Phases

    Social Engineering consists of multiple phases, each designed to move the attacker one step closer to the end goal.

    The social engineering phases consist of the following steps
    1. Gather information and details about the target through research and observation. Sources of information can include dumpster diving, phishing, websites, employees, company tours, or other interactions.
    2. Select a specific individual or group that may have access or information that you need to get closer to the desired target. Look for sources such as people who are frustrated, overconfident, or arrogant and willing to provide information readily.
    3. Forge a relationship with the intended victim through conversations, discussions, e-mails, or other means.
    4. Exploit the relationship with the victim, and extract the desired information.

    The four phases can also be looked at as three distinct components of the social engineering process
    • Research - equal to phase 1
    • Develop - phase 2 & 3
    • Exploit - Phase 4

    Certified Security Geek
Working...
X