Scenario 1
You have done the necessary research to understand the organizational structure of the organization you are penetrating. This can be based on documentation you were provided or information you have gleaned through various methods. But based on this information, you have targeted a specific individual. The knowledge you have found on this person will allow you to know that they have access to the specific data you want to try and get (or in the case of the penetration test, just testing whether you can get it).
So in my case, I called them up and impersonated someone from the company's IT help desk. I let the user know that I have seen their workstation making strange connections to the Internet and that I will need their username ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access