Psychological manipulation of people, employees in this case, that seeks to discover confidential information.
1. Evaluation
2. Strategic Planning
3. Operative Planning
4. Implementation
The attacker gathers information through different means included but not limited to social media or a search engine such as google.
Using both the information and the relationship to actively infiltrate the target for example calling someone pretending to be from the IT Department (relationship) asking for a specific employee (information gathering) and asking them for their password.
Establish a working relationship with a target for example pretending to need help and taking advantage of the good nature of the victim.
When the goal of the attack is accomplished, usually without the target even questioning what happened until it is too late.
Live course
Remote course
By Project (hourly rate)
Starter / Advanced / Premium
By Project (hourly rate)
Starter / Advanced / Premium