You will get a real-world scenario social engineering test

You will get a real-world scenario social engineering test

Project details
Social engineering refers to the use of psychological manipulation or deception to influence people into divulging confidential information, providing access to restricted areas or systems, or performing actions that may compromise security.
Social engineering attacks can take many forms, including phishing emails, phone calls or messages, impersonation, pretexting, baiting, and tailgating, among others. The goal of social engineering is often to exploit human vulnerabilities and bypass technical security measures in order to gain unauthorized access to information or systems.
Social engineering attacks can be carried out by individuals or organizations with malicious intent, and can target anyone, from individuals to large corporations and governments. It's important to be aware of the risks associated with social engineering and to take appropriate measures to protect against these types of attacks.
Our social engineering testing involves real-world and also custom phishing scenarios for your company. Also we will write report from simple that includes user activity to professional that involves best practices for email security and also statistics from a campaign.
Social engineering attacks can take many forms, including phishing emails, phone calls or messages, impersonation, pretexting, baiting, and tailgating, among others. The goal of social engineering is often to exploit human vulnerabilities and bypass technical security measures in order to gain unauthorized access to information or systems.
Social engineering attacks can be carried out by individuals or organizations with malicious intent, and can target anyone, from individuals to large corporations and governments. It's important to be aware of the risks associated with social engineering and to take appropriate measures to protect against these types of attacks.
Our social engineering testing involves real-world and also custom phishing scenarios for your company. Also we will write report from simple that includes user activity to professional that involves best practices for email security and also statistics from a campaign.
Testing Platform
Website Testing, Mobile Testing, Software TestingDevice
PC, Mac, Linux, iPhone, iPad, Android Mobile Phone, Android Tablet, Windows Phone, Windows TabletLanguage
EnglishWhat's included
Service Tiers |
Starter
$299
|
Standard
$460
|
Advanced
$670
|
---|---|---|---|
Delivery Time | 14 days | 7 days | 5 days |
Number of Revisions | 0 | 1 | 2 |
Test Scenario | |||
Summary Report | |||
Annotated Screenshots | |||
Test Desktop | |||
Test Mobile |
About Ignas
Penetration tester
Vilnius, Lithuania - 4:04 pm local time
Steps for completing your project
After purchasing the project, send requirements so Ignas can start the project.
Delivery time starts when Ignas receives requirements from you.
Ignas works on your project following the steps below.
Revisions may occur after the delivery date.
Client makes configurational changes
Client needs to make configurational changes in their system to make sure that email will be received.
We will buy a custom domain
We will buy a custom domain and set it up for a phishing simulation.