O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attack process

The process of social engineering has no formal procedure or approach to follow. Instead, we have presented some basic steps required to initiate a social engineering attack against your target. Intelligence gathering, identifying vulnerable points, planning the attack, and execution are the common steps taken by social engineers to successfully divulge and acquire the target information or access.

  1. Intelligence gathering: There are several ways to approach the most luring target for your penetration test. This can be done by harvesting the corporate e-mail addresses across the Web using advanced search engine tools, collecting personal information about people working for the organization through online social networks, identifying ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required