Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-003 Topic 2 Question 14 Discussion

Actual exam question for CompTIA's PT0-003 exam
Question #: 14
Topic #: 2
[All PT0-003 Questions]

A penetration tester is conducting reconnaissance for an upcoming assessment of a large corporate client. The client authorized spear phishing in the rules of engagement. Which of the following should the tester do first when developing the phishing campaign?

Show Suggested Answer Hide Answer
Suggested Answer: C

When developing a phishing campaign, the tester should first use social media to gather information about the targets.

Social Media:

Purpose: Social media platforms like LinkedIn, Facebook, and Twitter provide valuable information about individuals, including their job roles, contact details, interests, and connections.

Reconnaissance: This information helps craft convincing and targeted phishing emails, increasing the likelihood of success.

Process:

Gathering Information: Collect details about the target employees, such as their names, job titles, email addresses, and any personal information that can make the phishing email more credible.

Crafting Phishing Emails: Use the gathered information to personalize phishing emails, making them appear legitimate and relevant to the recipients.

Other Options:

Shoulder Surfing: Observing someone's screen or keyboard input to gain information, not suitable for gathering broad information for a phishing campaign.

Recon-ng: A tool for automated reconnaissance, useful but more general. Social media is specifically targeted for gathering personal information.

Password Dumps: Using previously leaked passwords to find potential targets is more invasive and less relevant to the initial stage of developing a phishing campaign.

Pentest Reference:

Spear Phishing: A targeted phishing attack aimed at specific individuals, using personal information to increase the credibility of the email.

OSINT (Open Source Intelligence): Leveraging publicly available information to gather intelligence on targets, including through social media.

By starting with social media, the penetration tester can collect detailed and personalized information about the targets, which is essential for creating an effective spear phishing campaign.


Contribute your Thoughts:

Nakisha
14 days ago
D. Password dumps all the way! It's like a cheat sheet for breaking into the company.
upvoted 0 times
...
Nicholle
16 days ago
Phishing? More like 'fishing' for compliments on your hacking skills!
upvoted 0 times
...
Ceola
17 days ago
C. Social media is the way to go. I bet the client's CEO has some juicy info on their Facebook page.
upvoted 0 times
Della
10 days ago
User 2: Good idea, we can use that information to craft a convincing phishing email.
upvoted 0 times
...
Margot
11 days ago
User 1: Let's check out the CEO's Facebook page for some personal details.
upvoted 0 times
...
...
Charisse
1 months ago
A. Shoulder surfing? Really? What is this, the 90s? Get with the times, people.
upvoted 0 times
Nenita
1 days ago
User3: Social media could also be a good source of information for the phishing campaign.
upvoted 0 times
...
Bronwyn
11 days ago
User2: Yeah, we should focus on more modern techniques like Recon-ng.
upvoted 0 times
...
Mabelle
19 days ago
User1: Shoulder surfing is so outdated.
upvoted 0 times
...
...
Hana
1 months ago
I agree with Lorean, Recon-ng would help gather information for the phishing campaign.
upvoted 0 times
...
Major
2 months ago
D. Password dumps could give you a ton of useful information to craft a convincing phishing email. Gotta love those data breaches!
upvoted 0 times
...
Dorothy
2 months ago
B. Recon-ng seems like the most comprehensive tool for reconnaissance. It's got everything you need in one place.
upvoted 0 times
Fannie
23 days ago
User 4: Definitely, using Recon-ng will give us a good starting point for the spear phishing campaign.
upvoted 0 times
...
Lacey
29 days ago
User 3: I agree, Recon-ng can provide a lot of valuable data for the phishing campaign.
upvoted 0 times
...
Latricia
1 months ago
User 2: Yeah, it's a powerful tool for reconnaissance.
upvoted 0 times
...
Denny
1 months ago
I think Recon-ng is the way to go for gathering information.
upvoted 0 times
...
...
Lorean
2 months ago
I think the first step should be Recon-ng.
upvoted 0 times
...
Deangelo
2 months ago
I think the answer is C. Social media is the best way to gather information for a phishing campaign.
upvoted 0 times
Dierdre
1 months ago
C: I agree with A, Recon-ng is definitely the way to go for this scenario.
upvoted 0 times
...
Luis
1 months ago
B: I disagree, I believe the answer is D. Password dumps can provide valuable credentials for a phishing campaign.
upvoted 0 times
...
Rochell
2 months ago
A: I think the answer is B. Recon-ng is a great tool for gathering information during reconnaissance.
upvoted 0 times
...
...

Save Cancel