Перейти к содержанию сайта
How I Socially Engineer Myself into High Security Facilities
Article

How I Socially Engineer Myself into High Security Facilities

A pentester shares a story that shows how social engineering can get you anywhere.

Motherboard, 2017

автоматическое преобразование текста в аудио
автоматическое преобразование текста в аудио

Editorial Rating

7

Qualities

  • Applicable
  • Eye Opening
  • Insider's Take

Recommendation

Every office building and computer network has vulnerabilities. The task of security professionals is to find them before criminals do. Many companies hire “pentesters” (penetration testers) who get creative at breaking into buildings and networks to evaluate an organization’s defenses. In a short article posted on Motherboard, penetration tester Sophie Daniel shares the tale of her most memorable break-in and draws conclusions about organizations’ most common vulnerabilities. getAbstract believes that her story serves as a warning to employees at every level.  

Take-Aways

  • As a “pentester” (penetration tester), Sophie Daniel assesses the security of organizations by finding and exploiting their vulnerabilities.
  • In one of her most memorable break-ins, Daniel employed impersonation tactics to win the trust of company employees.
  • Daniel used LinkedIn and other social media profiles to learn about an employee’s background and interests, which she exploited to build rapport and come across as trustworthy when pretending to be an interior designer surveilling the office space.

About the Author

Sophie Daniel is a facilities penetration tester and information security consultant. 


Comment on this summary or Начать обсуждение