Services Details

Social Engineering




Generally humans consider to be a weakest link in a company. Our engineers are handy in dispatching explicitly in attacks like phishing, vishing, whaling and also including other advanced social engineering attacks with an deployed goal of evaluating your company’s social engineering posture in addition of gaining access to requested sensitive data, Information, PII and customized service.

OUR METHODOLOGY

All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), OWASP Top 100 Scenerios, and customized testing frameworks.

  • Discover:Client aims are gathered and rules of engagement are obtained.
  • Analysis:Accomplish scanning and enumeration to identify critical vulnerabilities, weak areas and exploits.
  • Attack:Confirm critical vulnerabilities through exploitation and perform additional impacts over new access.
  • Reporting:Confirm critical vulnerabilities through exploitation and perform additional impacts over new access.