Information Gathering and
Social Engineering
This presentation explores information gathering techniques. It
also covers social engineering attack . Understand how OSINT and
social engineering combine to create threats.
Presented by – Akash Khawle
CYBERSECURITY ENGINEER
EMP ID:- CC0098
Maltego: Mapping Digital Connections
Maltego is a powerful link analysis and data mining tool. It visualizes
relationships between data points.
Link Analysis
Discover connections between entities.
Data Mining
Extract valuable information from data sources.
The Harvester: Uncovering Emails and
Subdomains
The Harvester is an open-source tool for gathering emails and subdomains. Find potential phishing targets with this
tool. Map an organization's attack surface.
Email Gathering Subdomain
Find email addresses associated with a domain. Identify subdomains belonging to a target domain.
Phishing: Exploiting
Human Trust
Phishing attacks exploit human psychology to gain sensitive
information.
Whaling
Smishing Vishing
Zphisher
Zphisher automates the creation of fake login pages. It simplifies
phishing campaign setup. Use generated pages for educational
purposes only.
Template Selection
Page Generation
Credential Harvesting
SEToolkit: Social
Engineering Simulation
SEToolkit is a framework for simulating social engineering attacks.
Test security awareness with simulated spear-phishing attacks.
Spear-Phishing Website Attacks
Credential Harvesting
.
Mr. Robot Project: Realistic Hacking Scenarios
Realistic
Real-world hacking.
Highlights
System vulnerabilities.
Educational
Cybersecurity training.
Strengthening Your Defenses
Security awareness training helps employees recognize phishing emails. Implement multi-factor authentication
(MFA). Enforce regular password updates. Verify requests through secondary channels.
Strong Passwords
Use strong and unique passwords.
MFA
Enable multi-factor authentication.
Verification
Verify requests via phone call or in
person.
Stay Secure
Combining OSINT and social engineering creates potent threats.
Proactive security measures are essential. Continuous education is
the best defense. Always report suspicious activities.
100%
Awareness
Stay informed about cyber threats.
0%
Trust
Verify all requests before trusting.
Thank You……