Chapter 7

Creating Targeted Scenarios

Gavin Watson,    Senior Security Engineer, RandomStorm Limited

Once the objectives have been agreed with the client, the next stage is to design scenarios to meet those objectives. This chapter provides a series of models that testers can use to create effective scenarios that not only meet objectives but also identify multiple vulnerabilities rather than concentrating on a single security flaw. The ultimate purpose of these models is to ensure that assessments provide value to the client and lead to improvements in their security.

Keywords

Social engineering scenarios; target identification; target profiling; physical reconnaissance; pretext design mapping; cover stories; exit strategies

Information in this ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.