Technologies in Use
Technologies in Use
One of the most valuable pieces of information about the infrastructure is the technologies the company uses. Often it is not always easy to get much of this information passively. However, we do have some tools at our disposal to help us extract this information. Here, too, any information resource can be of great importance. The focus here is on identifying technologies that we can later use to adapt our attacks against the company. Especially for social engineering attacks, this plays an important role later on. We can interact with the employees and communicate and build trust with customized information (which only trusted people know).
![[infra-techs.png]]
Such information includes any software or provider that makes such an application available. Once we understand what the company is using technologies, this will give us a reasonably accurate picture of the aspects that will be most relevant to us as we prepare our attack on the company.
Last updated