Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

NAME:

STD ID#
LAB#
11/12/2022
Using Social Engineering Techniques to Plan an Attack (3e)

Table of Contents
1 SECTION...............................................................................................................................................2
1.1 Whois information for Global Enterprises...................................................................................2
1.2 LouAnne’s GetConnected profile.................................................................................................2
1.3 First blog entry.............................................................................................................................3
1.4 Second blog entry........................................................................................................................3
1.5 Fake job ad...................................................................................................................................4
1.6 Current firewall software version number...................................................................................4
2 SECTION...............................................................................................................................................4
2.1 Services offered by Corporation Techs........................................................................................4
2.2 Corporation Techs corporate officers..........................................................................................5
2.3 Contents of the email..................................................................................................................5
2.4 Resulting web page......................................................................................................................6
2.5 Personal information about each corporate officer.....................................................................6
3 SECTION...............................................................................................................................................7
3.1 Results of the Nmap scan............................................................................................................7
3.2 Script that will open the file.........................................................................................................7
3.3 Result of your actions..................................................................................................................8
3.4 Summary......................................................................................................................................8

1|Page
Using Social Engineering Techniques to Plan an Attack (3e)

1 SECTION

1.1 Whois information for Global Enterprises

1.2 LouAnne’s GetConnected profile

2|Page
Using Social Engineering Techniques to Plan an Attack (3e)

1.3 First blog entry

1.4 Second blog entry

3|Page
Using Social Engineering Techniques to Plan an Attack (3e)

1.5 Fake job ad

1.6 Current firewall software version number


GB-OS firewall is used for Global Enterprise and version of p Sense 6 is now installed.

2 SECTION

2.1 Services offered by Corporation Techs

4|Page
Using Social Engineering Techniques to Plan an Attack (3e)

2.2 Corporation Techs corporate officers

2.3 Contents of the email

5|Page
Using Social Engineering Techniques to Plan an Attack (3e)

2.4 Resulting web page

2.5 Personal information about each corporate officer

Andrew Symonds
 University and years: San Diego State University logo San Diego State
University and N/A.
 Officer lives: Addison, Texas, United States.
 Sales Executive (Wodash Incorporated) 13 yrs 5 mos
Mike Hutchins
 University and years: Virginia Tech and 1992-1996
 Officer lives: Addison, Texas, United States.
 Security Officer (Aegis Secured) 7 yrs 4 mos
Dee Dasher
 University and years: Texas State University and 1985-1989
 Officer lives: Addison, Texas, United State.
 Operations (Dante's Inc) 8 yrs 7 mos

6|Page
Using Social Engineering Techniques to Plan an Attack (3e)

3 SECTION

3.1 Results of the Nmap scan

3.2 Script that will open the file

7|Page
Using Social Engineering Techniques to Plan an Attack (3e)

3.3 Result of your actions

3.4 Summary

Digital forensics is the process of finding and analyzing computer technology and online files. These are
often linked to big crimes like terrorism and crime, but they can also be linked to smaller business
problems like employee misconduct and cyberbullying. I think that digital forensics needs a lot of work.
There may be results, but the results aren't always right. Social engineering is so dangerous because it
relies on mistakes made by people instead of flaws in hardware or software. User mistakes are much
harder to predict, which makes it harder to find and stop them than antivirus intrusions. You have the
power to fight back against the hacker.

8|Page

You might also like