Sie sind auf Seite 1von 2

Social Engineering

Assessment & Compliance Services Division


847.221.0200 halock.com

Solution Overview
Solution Social engineering is the practice of
At-a-Glance: obtaining confidential information
by manipulation of legitimate
 Test end user security
awareness, ensuring em-
users. During social engineering
ployees and staff adequately testing, Halock exploits the natural
safeguard confidential infor- tendency of a person to trust
mation and trade secrets another person’s word, rather than
 Attempt to gain access to exploiting computer security holes.
sensitive information
through remote or onsite It is generally agreed upon that
efforts “users are the weak link” in security
and this principle is what makes
 Simulate Phishing attacks to
determine if users will open
social engineering possible. Social
fraudulent emails and dis- engineering tests the effectiveness
close credentials to the at- of the organization’s policies as well
tacker as employee security awareness.
 Can be performed blind
Halock’s Red Team may use the telephone, carefully crafted email messages, and physical access
(with no previous knowledge
or assistance) or in a col- techniques to coerce the organization’s employees into revealing sensitive information or granting
laborative manner unauthorized access, in violation of established policies.

Information gathered during social engineering efforts is utilized during ethical hacking (if
included in the scope of the assessment), leveraging the information gathered to further attempt
to exploit vulnerable applications, systems, and processes such as user registration, user access
provisioning, and system maintenance.

Professional Services Included : Pricing:

 Pricing varies based on the


 Information collection, such as the names of  Attempts to gain access to physical size, complexity, and depth of
key IT staff members, credentials, system information assets through onsite entry testing
information, locations of systems or data, etc,
 Remote testing (phone and
using public sources  Documentation of findings, including
email) typically ranges from
detailed walkthroughs of exploit scenarios $4,000 to $8,000
 Attempts to gain access to sensitive
information remotely via telephone contact  Onsite testing (physical
breach) typically ranges from
using pre texting and persuasion methods
$2,500 to $5,000 per location

 Attempts to gain access to sensitive


information remotely via email contact and
Phishing

1834 Walden Office Square, Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com
847.221.0200 halock.com

Social Engineering: Scope Worksheet

Testing will be performed using the following approach:


COLLABORATIVELY
BLIND (NO ASSISTANCE FROM CLIENT)

The following methods are conducted during social engineering:

METHOD SCOPE

Phone

Email / Phishing

Physical Penetration

The following special considerations will be incorporated into the assessment:

1834 Walden Office Square Suite 150 * Schaumburg, IL 60173 * 847.221.0200 * www.halock.com

Das könnte Ihnen auch gefallen