Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-003 Topic 2 Question 14 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 14
Topic #: 2
[All PT0-003 Questions]

A penetration tester is conducting reconnaissance for an upcoming assessment of a large corporate client. The client authorized spear phishing in the rules of engagement. Which of the following should the tester do first when developing the phishing campaign?

Show Suggested Answer Hide Answer
Suggested Answer: C

When developing a phishing campaign, the tester should first use social media to gather information about the targets.

Social Media:

Purpose: Social media platforms like LinkedIn, Facebook, and Twitter provide valuable information about individuals, including their job roles, contact details, interests, and connections.

Reconnaissance: This information helps craft convincing and targeted phishing emails, increasing the likelihood of success.

Process:

Gathering Information: Collect details about the target employees, such as their names, job titles, email addresses, and any personal information that can make the phishing email more credible.

Crafting Phishing Emails: Use the gathered information to personalize phishing emails, making them appear legitimate and relevant to the recipients.

Other Options:

Shoulder Surfing: Observing someone's screen or keyboard input to gain information, not suitable for gathering broad information for a phishing campaign.

Recon-ng: A tool for automated reconnaissance, useful but more general. Social media is specifically targeted for gathering personal information.

Password Dumps: Using previously leaked passwords to find potential targets is more invasive and less relevant to the initial stage of developing a phishing campaign.

Pentest Reference:

Spear Phishing: A targeted phishing attack aimed at specific individuals, using personal information to increase the credibility of the email.

OSINT (Open Source Intelligence): Leveraging publicly available information to gather intelligence on targets, including through social media.

By starting with social media, the penetration tester can collect detailed and personalized information about the targets, which is essential for creating an effective spear phishing campaign.


Contribute your Thoughts:

Hana
4 days ago
I agree with Lorean, Recon-ng would help gather information for the phishing campaign.
upvoted 0 times
...
Major
9 days ago
D. Password dumps could give you a ton of useful information to craft a convincing phishing email. Gotta love those data breaches!
upvoted 0 times
...
Dorothy
11 days ago
B. Recon-ng seems like the most comprehensive tool for reconnaissance. It's got everything you need in one place.
upvoted 0 times
Denny
2 days ago
User 1: I think Recon-ng is the way to go for gathering information.
upvoted 0 times
...
...
Lorean
15 days ago
I think the first step should be Recon-ng.
upvoted 0 times
...
Deangelo
15 days ago
I think the answer is C. Social media is the best way to gather information for a phishing campaign.
upvoted 0 times
Rochell
7 days ago
A: I think the answer is B. Recon-ng is a great tool for gathering information during reconnaissance.
upvoted 0 times
...
...

Save Cancel