Client-side attacks and social engineering

  title={Client-side attacks and social engineering},
  author={Jeremy Faircloth},
Some of the data that we gather in the reconnaissance, scanning, and enumeration phases may include information around client machines and individual people. In many penetration tests, using these is considered a valid attack vector and should be considered as a point of entry into the systems that you're attempting to compromise. In this chapter, we'll be talking about social engineering and other attacks which can be used against individuals and their client workstations. We'll even go over… CONTINUE READING

Similar Papers