0% found this document useful (0 votes)
12 views10 pages

3rd cc0098 Maltego-Information-Gathering

The presentation discusses information gathering techniques and social engineering attacks, highlighting tools like Maltego and The Harvester for data mining and email gathering. It emphasizes the importance of security awareness training, multi-factor authentication, and proactive measures to combat phishing and social engineering threats. Continuous education and verification of requests are crucial for maintaining cybersecurity.

Uploaded by

akash9561626980
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views10 pages

3rd cc0098 Maltego-Information-Gathering

The presentation discusses information gathering techniques and social engineering attacks, highlighting tools like Maltego and The Harvester for data mining and email gathering. It emphasizes the importance of security awareness training, multi-factor authentication, and proactive measures to combat phishing and social engineering threats. Continuous education and verification of requests are crucial for maintaining cybersecurity.

Uploaded by

akash9561626980
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Information Gathering and

Social Engineering
This presentation explores information gathering techniques. It
also covers social engineering attack . Understand how OSINT and
social engineering combine to create threats.

Presented by – Akash Khawle


CYBERSECURITY ENGINEER
EMP ID:- CC0098
Maltego: Mapping Digital Connections

Maltego is a powerful link analysis and data mining tool. It visualizes


relationships between data points.

Link Analysis
Discover connections between entities.

Data Mining

Extract valuable information from data sources.


The Harvester: Uncovering Emails and
Subdomains
The Harvester is an open-source tool for gathering emails and subdomains. Find potential phishing targets with this
tool. Map an organization's attack surface.

Email Gathering Subdomain


Find email addresses associated with a domain. Identify subdomains belonging to a target domain.
Phishing: Exploiting
Human Trust
Phishing attacks exploit human psychology to gain sensitive
information.

Whaling

Smishing Vishing
Zphisher

Zphisher automates the creation of fake login pages. It simplifies


phishing campaign setup. Use generated pages for educational
purposes only.

Template Selection

Page Generation

Credential Harvesting
SEToolkit: Social
Engineering Simulation
SEToolkit is a framework for simulating social engineering attacks.
Test security awareness with simulated spear-phishing attacks.

Spear-Phishing Website Attacks

Credential Harvesting
.
Mr. Robot Project: Realistic Hacking Scenarios
Realistic
Real-world hacking.

Highlights
System vulnerabilities.

Educational
Cybersecurity training.
Strengthening Your Defenses
Security awareness training helps employees recognize phishing emails. Implement multi-factor authentication
(MFA). Enforce regular password updates. Verify requests through secondary channels.

Strong Passwords
Use strong and unique passwords.

MFA
Enable multi-factor authentication.
Verification
Verify requests via phone call or in
person.
Stay Secure
Combining OSINT and social engineering creates potent threats.
Proactive security measures are essential. Continuous education is
the best defense. Always report suspicious activities.

100%
Awareness
Stay informed about cyber threats.

0%
Trust

Verify all requests before trusting.


Thank You……

You might also like