-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
By :

To carry out a successful social engineering attack, attackers perform the following steps:
An attacker acquires enough information to infiltrate the target organization's network before attacking it. One strategy that aids in knowledge extraction is social engineering. The attacker begins by gathering basic information about the target company, such as the nature of the business, its location, and the number of employees. The attacker engages in activities such as dumpster diving, browsing a company's website, and discovering employee information.
The attacker selects a target for extracting sensitive information about the company after completing their research. Attackers frequently attempt to contact dissatisfied employees because they are often willing to share information about the target company and are easier to manipulate.
Change the font size
Change margin width
Change background colour