Kali Linux Assuring Security by Penetration Testing, Fourth Edition by Shiva V. N Parasram

Kali Linux Assuring Security by Penetration Testing, Fourth Edition by Shiva V. N Parasram

Author:Shiva V. N Parasram
Language: eng
Format: mobi, epub
Tags: COM060040 - COMPUTERS / Security / Online Safety and Privacy, COM043050 - COMPUTERS / Security / Networking, COM053000 - COMPUTERS / Security / General
Publisher: Packt publishing
Published: 2018-11-14T11:17:45+00:00


Influential authority

An attack method where one manipulates the target's business responsibilities is known as an influential authority attack. This kind of social engineering attack is sometimes part of an impersonation method. Humans, by nature, act in an automated fashion to accept instructions from their authority or senior management, even if their instincts suggest that certain instructions should not be pursued. This makes us vulnerable to certain threats. For example, if someone wanted to target the XYZ company's network administrator to acquire their authentication details, they would have observed and noted the phone numbers of the administrator and the CEO of the company through a reciprocation method. Now, using a call-spoofing service (for example, www.spoofcard.com) to call the network administrator, they would notice that the call is coming from the CEO and should be prioritized. This method influences the target to reveal information to an impersonated authority; as such, the target has to comply with the company's senior management instructions.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.