"’ ve recently used sendgrid as a mail delivery service, which is supported by another tool i ’ ve thrown together and can run right with this file format. defender recommendations first and foremost, be sure to incorporate content into your security awareness training communicati…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1589.002Email Addresses
67%
"iterate over each of these roles and use grep with the inverse flag to filter them from the csv file. use the reverse of this technique to identify key roles you may be interested in targeting for social engineering attacks. crafting a list of emails for password spray attacks i …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1593.001Social Media
56%
"collecting and crafting user information from linkedin collecting and crafting user information from linkedin justin angel / / penetration testing and red team engagements often require operators to collect user information from various sources that can then be translated into in…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1585.001Social Media Accounts
45%
"s security awareness training, personnel may have their profiles configured to hide personal information before first establishing a connection with your account the remainder of this brief post will discuss my strategy for gaining as much profile content as possible and a quick …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1585.001Social Media Accounts
32%
"most practical recommendation but company admins have minimal control over who can join a company profile. bonus vulnerability discovery a previously unknown access control flaw was identified in linkedin while developing the image spoofing capability of peasant. i initially trie…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Justin Angel // Penetration testing and red team engagements often require operators to collect user information from various sources that can then be translated into inputs to support social engineering […]