Professional Documents
Culture Documents
Using Social Engineering Techniques To Plan An Attack (3e)
Using Social Engineering Techniques To Plan An Attack (3e)
STD ID#
LAB#
11/12/2022
Using Social Engineering Techniques to Plan an Attack (3e)
Table of Contents
1 SECTION...............................................................................................................................................2
1.1 Whois information for Global Enterprises...................................................................................2
1.2 LouAnne’s GetConnected profile.................................................................................................2
1.3 First blog entry.............................................................................................................................3
1.4 Second blog entry........................................................................................................................3
1.5 Fake job ad...................................................................................................................................4
1.6 Current firewall software version number...................................................................................4
2 SECTION...............................................................................................................................................4
2.1 Services offered by Corporation Techs........................................................................................4
2.2 Corporation Techs corporate officers..........................................................................................5
2.3 Contents of the email..................................................................................................................5
2.4 Resulting web page......................................................................................................................6
2.5 Personal information about each corporate officer.....................................................................6
3 SECTION...............................................................................................................................................7
3.1 Results of the Nmap scan............................................................................................................7
3.2 Script that will open the file.........................................................................................................7
3.3 Result of your actions..................................................................................................................8
3.4 Summary......................................................................................................................................8
1|Page
Using Social Engineering Techniques to Plan an Attack (3e)
1 SECTION
2|Page
Using Social Engineering Techniques to Plan an Attack (3e)
3|Page
Using Social Engineering Techniques to Plan an Attack (3e)
2 SECTION
4|Page
Using Social Engineering Techniques to Plan an Attack (3e)
5|Page
Using Social Engineering Techniques to Plan an Attack (3e)
Andrew Symonds
University and years: San Diego State University logo San Diego State
University and N/A.
Officer lives: Addison, Texas, United States.
Sales Executive (Wodash Incorporated) 13 yrs 5 mos
Mike Hutchins
University and years: Virginia Tech and 1992-1996
Officer lives: Addison, Texas, United States.
Security Officer (Aegis Secured) 7 yrs 4 mos
Dee Dasher
University and years: Texas State University and 1985-1989
Officer lives: Addison, Texas, United State.
Operations (Dante's Inc) 8 yrs 7 mos
6|Page
Using Social Engineering Techniques to Plan an Attack (3e)
3 SECTION
7|Page
Using Social Engineering Techniques to Plan an Attack (3e)
3.4 Summary
Digital forensics is the process of finding and analyzing computer technology and online files. These are
often linked to big crimes like terrorism and crime, but they can also be linked to smaller business
problems like employee misconduct and cyberbullying. I think that digital forensics needs a lot of work.
There may be results, but the results aren't always right. Social engineering is so dangerous because it
relies on mistakes made by people instead of flaws in hardware or software. User mistakes are much
harder to predict, which makes it harder to find and stop them than antivirus intrusions. You have the
power to fight back against the hacker.
8|Page