Skip to content

Social Engineering Attack Preparation

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into attack preparation The D20 entropy device An attack preparation is a dry-run of your attack. Before we can do that I would recommend you to invest in a D20 (which can be found in your local board game shop). The D20 is a dice… Read more Social Engineering Attack Preparation

Social-Engineering Target Profiling

In a previous blog post I told you about the two approaches for social engineering attacks. The structured approach has the following steps. The OSINT Process The target selection Profiling the target Target specific OSINT The attack preparation The attack execution Today we dive deeper into target profiling $whoami Before you can start target profiling I would recommend you to think about yourself first. It is important to understand yourself well enough before you start with social engineering since you are the tool you will be using. Technology is just… Read more Social-Engineering Target Profiling