2003
DOI: 10.1016/s1363-4127(03)00007-4
|View full text |Cite
|
Sign up to set email alerts
|

Penetration testing and social engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 0 publications
0
24
0
Order By: Relevance
“…The first two justifications are general for penetration testing and its benefits, and have been discussed earlier in the literature (for example, Barrett [6]). The third justification states that the risk induced by the test should be no greater than the risks we face in daily lives.…”
Section: Figure 9: Evaluation Of Both Methodologiesmentioning
confidence: 99%
See 2 more Smart Citations
“…The first two justifications are general for penetration testing and its benefits, and have been discussed earlier in the literature (for example, Barrett [6]). The third justification states that the risk induced by the test should be no greater than the risks we face in daily lives.…”
Section: Figure 9: Evaluation Of Both Methodologiesmentioning
confidence: 99%
“…OSSTMM also does not consider direct interaction between the penetration tester and the employees. Barret [6] provides an audit-based methodology for social engineering using direct interaction between the penetration tester and an employee. Since this is an audit-based methodology, the goal is to test all employees.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The process of a social engineering attack consists of three phases: identify a potential target, data collection to understand and find weaknesses within the target and finally exploit the vulnerabilities identified [20]. This experiment followed the same phases.…”
Section: Proof-of-conceptsmentioning
confidence: 99%
“…Researchers and organizations recognize that the employees are the weakest link in the organization [20,21,22]. Since the logs from the laptop thefts were insufficient to provide us with this information, we orchestrated a set of penetration tests where we used social engineering as a means to obtain a laptop.…”
Section: ) Limitation Of the Logsmentioning
confidence: 99%