skip to Main Content
Talk to a Security Expert Now: (800) 721-9177

Social Engineering

The best technical defense won’t protect you against a socially engineered attack. This overlooked threat is an extraordinary security risk.

Social Engineering Summary

In today’s world, social engineering is one of the most commonly used vectors by attackers to gain access to a company’s physical location and/or sensitive data. Many organizations believe their yearly security awareness trainings are enough to warn their employees of these type of attacks – but, how do they really know if they are effectively working?

Redspin’s social engineering team continuously evolves and adapts to changing threats

Here at Redspin, we launch realistic social engineering campaigns to evaluate how employees will react to social engineering attacks. Redspin begins social engineering assessments with open-source intelligence gathering to create customized real-world attacks.


Social Engineering Introduction

Today, social engineering techniques are more sophisticated and effective than ever before. Attacks on human networks are personal, evolving, and relentless. This combination of technology, psychology, and innovation has become an extremely popular and effective way of breaching security and gaining access to sensitive data.

Redspin’s Social Engineering Assessments will help clients answer the following questions:

  • How susceptible is our company to social engineering attacks?
  • Are our physical security controls working against an onsite attacker?
  • Are our email filters catching targeted phishing emails?
  • How effective is our security awareness training?

Social Engineering Framework

Redspin’s Social Engineering Framework consists of three categories: Test, Identify and Secure. This framework should be implemented yearly in order for clients to see if they are improving or need to take further actions.


Identify information which is deemed to be of value and to be the focus of the OSINT phase. These items are typically sensitive or proprietary to company operations.


Gather bulk information based on input from the Identify Phase by utilizing only free, open source channels. The collection phase utilizes both automated and manual discovery processes.


All collected information is manually inspected in detail for possible disclosure of sensitive information requested during the Identify Phase.


Once information is found and analyzed, every finding is documented in a prioritized list. Redspin includes this list along with recommendations in the final report.

Social Engineering Scope

Assessment Approaches

Each of Redspin’s Social Engineering Assessments are broken down into either black box or white box methods. These style of assessment approaches are designed to give clients two different options for level of effort.

Black Box

In a black box style assessment, the social engineer begins the assessment with no prior information from the client, in order to see what types of intelligence (OSINT) they can find online.  For these campaigns, the social engineer will gather E-mail addresses, phone numbers and information about the physical security controls to develop custom attack vectors.

Benefits of black box assessments:

  • More realistic – Redspin’s social engineers see what they can find without guidance of client
  • Best method to simulate outside threats

White Box

During white box assessments the client provides the targets they wish to be tested, such as: phone numbers (Vishing), E-mail addresses (Phishing), and locations (Physical).

Benefits of white box assessments:

  • Client controls what information and which employees they want assessed
  • Best method to simulate insider threats

OSINT (Open-Source Intelligence Gathering)

Attackers utilize OSINT gathering tactics against companies to search for information that could be found in job postings, employee social media accounts, or even third party associations. Once intelligence is collected, they leverage it to create social engineering campaigns. Redspin utilizes the same tactics to gather intelligence.


Phishing has been the starting point of many data breaches. It is imperative that companies are continuously training and testing for this style of attack. Our Phishing Assessments test what percentage of client employees will pass or fail to a phishing campaign.


Vishing (known as voice phishing) is eliciting sensitive information via the phone. Redspin utilizes multiple approaches to gain information, such as spoofing phone numbers and impersonation, just as a malicious actor would.


A Physical Assessment can validate clients’ physical security controls in place and company policies, or show them areas that need improvement.

Physical security controls, which Redspin will assess:

  • Video surveillance
  • Security guards
  • Locks

Company policies that may be tested:

  • No tailgating policies
  • Question visitors who are not wearing guest badges
  • Dumpster driving
  • USB Drops

Penetration Testing Services

Redspin’s security assessment services are designed to lower risk and protect data. By tailoring the right combination of network/infrastructure, application/service, and personnel security testing… We can ensure the best return on your investment.

Penetration Testing

Comprehensive risk, vulnerability, and penetration testing intelligence with prioritized risk-rated recommendations.

Learn more

Red Team Assessments

Our most comprehensive security assessment, combining penetration testing, application security testing, and social engineering.

Learn more

Application Security

Get world-class security engineers to test vulnerabilities in your web, mobile, & cloud applications.

Learn more

Social Engineering

OSINT, phishing, vishing and physical campaigns to pinpoint your vulnerabilities and promote awareness and education.

Learn more

Back To Top