How Social Engineering Works ?

Social Engineering

Collect Information

This is the first stage in which the person learns as much as possible about the alleged victim. Information is collected from company websites, other publications, and sometimes through conversations with users of the target system.

Attack Plan

The attackers outline how he/she intends to carry out the attack.

Acquire Tools

This includes computer programs that an attacker would use when launching an attack.

Attack

Exploit the weaknesses of the target system.

Use The Acquired Knowledge

Information collected during social engineering tactics, such as pet names, dates of birth of the organization’s sponsors, etc., is used in attacks such as guessing passwords.


Warning ! ! !
All The Information Provided Here Is For Educational Purposes Only.
You Are Solely Responsible For What You Do With This Information.

Download As PDF

Print This Page


Join Us On Telegram
Join Us On Telegram