How Social Engineering Works ?

0


Social Engineering

Collect Information

This is the first stage in which the person learns as much as possible about the alleged victim. Information is collected from company websites, other publications, and sometimes through conversations with users of the target system.

Attack Plan

The attackers outline how he/she intends to carry out the attack.

Acquire Tools

This includes computer programs that an attacker would use when launching an attack.

Attack

Exploit the weaknesses of the target system.

Use The Acquired Knowledge

Information collected during social engineering tactics, such as pet names, dates of birth of the organization’s sponsors, etc., is used in attacks such as guessing passwords.

Post a Comment

0Comments

Post a Comment (0)