organization but can also limit the success rate of a phish. In cases where phishing is risky, consider white carding. A solid strategy is to send a phishing email to a trusted insider. That person will click links or provide information as directed by the phish. This allows a phishing payload to be delivered in apolitically safe manner while allowing the phishing email to touch all the security defenses. This model uses the assumption that a user will succumb to a phishing attack.
The challenge for the RedTeam is to bypass the security protections designed to protect users from themselves.
A phish that leads to the compromise of a single system maybe acceptable. A phish that leads to the compromise of an organization is not acceptable as multiple failures must have occurred in organizational controls (technical, policy, procedural, etc. The authors are aware these are controversial statements and provide the following concepts for thought.
Share with your friends: