Certified Ethical Hacker (CEHv9) Questions and answers
83. You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email(boss@company ). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with finks. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network.
What testing method did you use?
B. Social engineering
84. Which of the following is designed to indentify malicious attempts to penetrate systems