Playbook for social engineeringBy venkat
All social engineering techniques rely on exploiting aspects of human interaction and decision-making known as cognitive biases.
The most common techniques: pretexting, baiting, quid pro quo and tailgating. Phishing attacks also rely upon social engineering.
Will be added soon.
- Coming up soon
March 13, 2020: Initial Version
About The Author
Venkat is founder of FlexibleIR. He brings 20 years of experience in building tools and products at Sun Microsystems, Intel, Novell, HP, Yahoo,Tesco and startups. He has developed test suites and frameworks for post silicon validation of the Xeon processor family (Fuzzing). He has worked deeply on UFS files system at SUN Microsystem. Was a security paranoid at Yahoo.