How Social Engineering Works ?

Social Engineering

Collect Information

This is the first stage in which the person learns as much as possible about the alleged victim. Information is collected from company websites, other publications, and sometimes through conversations with users of the target system.

Attack Plan

The attackers outline how he/she intends to carry out the attack.

Acquire Tools

This includes computer programs that an attacker would use when launching an attack.

Also Read  How To Use Google Dorks To Find Passwords ?

Attack

Exploit the weaknesses of the target system.

Use The Acquired Knowledge

Information collected during social engineering tactics, such as pet names, dates of birth of the organization’s sponsors, etc., is used in attacks such as guessing passwords.

Here You Will Find All Kind OF Information Related To Cybersecurity, What Is Hacking, All Kind Of Hacking Attacks Informations. So That You Can Avoid Such Problemes. Which Says Precision Is Better Than Cure.


Warning ! ! !
All The Information Provided Here Is For Educational Purposes Only.
You Are Solely Responsible For What You Do With This Information.

Disclaimer ! ! !
We Don't Support Or Promote Any Illegal Activities.
Our Main Goal Is To Spread Awareness On CyberSecurity Among People.
So, That They Can Avoid Such Tragedy

Leave a Comment