System and method for conducting social engineering red team campaigns
Computer implemented methods are provided for facilitating social engineering campaigns. The methods generally include maintaining at least one database that includes metadata for a plurality of fictional personas, metadata for a plurality of potential targets, information for a plurality of social...
Saved in:
Main Authors | , , , , , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
23.02.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Computer implemented methods are provided for facilitating social engineering campaigns. The methods generally include maintaining at least one database that includes metadata for a plurality of fictional personas, metadata for a plurality of potential targets, information for a plurality of social engineering campaigns, such as a plurality of campaign scenarios, and information regarding social engineering successes with respect to at least one fictional persona, at least one potential target, at least one social engineering campaign, or a combination thereof. The method further includes receiving a selection of a campaign scenario from the plurality of campaign scenarios, receiving a selection of at least one of the plurality of potential targets, and selecting at least one of the plurality of fictional personas for use in a social engineering campaign based on an expected effectiveness of the given fictional personas with respect to the selected targets. |
---|---|
Bibliography: | Application Number: AU20210336803 |