Page 4 - CPTE_Prep_Guide_Sample
P. 4

carefully about what he’s asking
                                 for
                       •  Deceptive Relationships
                              o  Depending on the target, an
                                 attacker may build a
                                 relationship over years just to
                                 exploit it
                       •  Integrity and Consistency
                              o  People will even carry out
                                 commitments they believe were
                                 made by their fellow employees
                       •  Social Proof
                              o  People usually rely on what
                                 other people are doing or saying
                                 to a certain degree

                   Additional SE techniques include pretexting,
                   diversion theft, phishing/spear phishing,
                   water holing, baiting, quid pro quo, tailgating,
                   vishing.

                   A popular social engineering tool is the social
                   engineering toolkit sponsored by TrustedSec
                   and is an open-source penetration testing
                   framework designed for social engineering.

                   On-Location Gathering Penetration Testing
                   Execution Standard

                   Selecting specific locations for onsite
                   gathering, and then performing




                                                               409
   1   2   3   4   5   6   7   8   9