INSIGHTS, NEWS & DISCOVERIES
FROM IOACTIVE RESEARCHERS

Tuesday, November 8, 2011

Automating Social Engineering: Part Two

Phase 1: Info Gathering Phase (Reconnaissance)

As with any other type of penetration test, we need to gather information. The only difference here is that instead of looking for operating system types, software versions, and vulnerabilities, we're searching for information about the company, their employees, their social networking presence, et cetera.

Tuesday, November 1, 2011

Automating Social Engineering: Part One

Since the original conceptualization of computer security, and perhaps even before, social engineering has been in existence. One could say that social engineering began when societies began, whether it was realized or not. It is now time to give some of this work to scripts and applications to make it a little more interesting…