Reconnaissance
- Information gathering from various online sources and social network sites
- Business applications and software
Social Engineering
- Phishing emails or messages coming from a target's social network
- Phone calls from assumed known entity
Break In
- Delivery through email
- Software vulnerabilities
Phishing Sample Email