O'Reilly logo

Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

8 
Writing the Social Engineering Report
(News) reporting is a cycle: No matter how much you work at sending a message, it’s only successful if it’s received.
—Jessica Savitch, news reporter
Putting together a social engineering report is by far and away the most tedious part of the whole social engineering process, but it has to be done. The report is the only tangible output from the social engineering process and, as such, is effectively what your client is paying for. It’s especially hard to put together because it comes after you have had so much fun actually executing the test. Unfortunately, as a result, this chapter is probably the most boring one in this book, although I will try to make it as interesting as possible. On some very ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required