December 2014
Intermediate to advanced
464 pages
12h 47m
English
How did we get here? With such artful executions of a social engineering attack, it might be hard to believe the previous step would ever fail. Maybe you weren’t able to find any target users that would allow us to reach the assets we were targeting. Or maybe, based on our reconnaissance, we thought that there might be technologies in place or that the target users would be abnormally educated, making our chances of success too small to even attempt a spear-phishing attack. Whatever the reason, it’s time to move on to targeting remote users and remote locations.
Identifying and targeting wireless systems is really at the core of this phase, as it still allows you to maintain some of the most important criteria ...
Read now
Unlock full access