Social engineering – summary

In this section, let's see how we can build up an attack strategy against our target, which is a person named Zaid. Before we move ahead, we will organize the workspace so that we can come up with ideas. For our example, we are going to keep only the useful information such as Udemy. We are going to put Zaid, who is our main entity, at the top, and then just click and drag an arrow from the email address so that we know that Zaid is associated with the zaid@isecur1ty.org address. Zaid is associated with the zaid@isecur1ty.org email, which led us to isecur1ty.org. And then we're going to add another arrow from Zaid to his Twitter account, so that we know that this Twitter account is associated with this person, ...

Get Learn Ethical Hacking from Scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.