47
insufficient or too fabricated to be of help and, therefore, more data sources may be required.
An attacker may, therefore, be forced to gather data using specialized software tools or using
soft skills to directly get this data from the target without raising alarm.
Information is hardly gathered all at once. Doing so is hard and is therefore common
for a social engineer to collect small pieces of data and combine them to complete a puzzle
about the target.
For instance, while gathering information about a CEO, an attacker may
start by interviewing people that the CEO comes across or talks to. Janitors, secretaries,
subordinates, or even visitors may be wisely interviewed
to find out small pieces of
information that may not be so useful discreetly but very powerful when put together. Even
the most insignificant of people that a target interacts with may have a key to unlocking a
much larger puzzle. Therefore, any source of information is treated as valuable.
Dostları ilə paylaş: