As shown in the previous examples, there are two keys to success in launching a social engineering attack. The first is obtaining the information needed to make it work – usernames, business information, and supporting details about networks, systems, and applications.
However, the majority of the effort is focused on the second aspect – crafting the attack to entice the target into opening an executable or clicking on a link.
Several attacks produce modules that require the victim to execute them in order for the attack to succeed. Unfortunately, users are increasingly wary about executing unknown software. However, there are some ways to increase the possibility of successful execution of the attack, including the following:
- Attack from a system that is known and trusted by the intended victim, or spoof...