Penetration Testing mailing list archives
Penetration Testing - Human Factor
From: "Marios A. Spinthiras" <mario () netway com cy>
Date: Mon, 21 Aug 2006 09:19:39 +0300
As a thorough sceptic Id like to conclude in most cases of a TRUE hacking incident social engineering has been a factor of success for the malicious user attacking a system. For quite a while now I have been compiling methodology on the assessment of the weak human security link which can be exploited through social engineering. Has anyone got any thoughts they would like to share or guidelines to the audit of the human factor when security is concerned?
Any information is much apreciated. Many Thanks,Mario A. Spinthiras
------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php ------------------------------------------------------------------------
Current thread:
- Penetration Testing - Human Factor Marios A. Spinthiras (Aug 21)
- Bluetooth Pentesting? steven (Aug 21)
- RE: Bluetooth Pentesting? Robert D. Holtz (Aug 21)
- Re: Bluetooth Pentesting? Fabio Nigi (Aug 22)
- Re: Bluetooth Pentesting? Thor (Hammer of God) (Aug 22)
- SV: Bluetooth Pentesting? Martin Gustafsson (Aug 22)
- Re[2]: Bluetooth Pentesting? Thierry Zoller (Aug 22)
- Re: Bluetooth Pentesting? Times Enemy (Aug 22)
- RE: Bluetooth Pentesting? Robert D. Holtz (Aug 21)
- RE: Penetration Testing - Human Factor Paul Melson (Aug 21)
- RE: Penetration Testing - Human Factor Arian J. Evans (Aug 21)
- Re: Penetration Testing - Human Factor Marios A. Spinthiras (Aug 23)
(Thread continues...)
- Bluetooth Pentesting? steven (Aug 21)