CG
SkillsConducting Social Engineering Pretext Call
Start Free
Back to Skills Library
Red Team & Offensive Security🟡 Intermediate

Conducting Social Engineering Pretext Call

Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social engineering and evaluate security awareness controls.

5 min read1 code examples5 MITRE techniques

Prerequisites

  • Written authorization specifying social engineering scope and boundaries
  • List of approved target employees (usually provided by client)
  • OSINT research on targets and organization
  • Spoofed caller ID capability (authorized for testing)
  • Call recording equipment (with legal consent as required)
  • Pretext scenarios approved by client

MITRE ATT&CK Coverage

T1566.004T1598T1598.003T1589T1591

Conducting Social Engineering Pretext Call

Overview

A pretext call (vishing) is a social engineering technique where an attacker impersonates a trusted authority figure over the phone to manipulate targets into divulging sensitive information, performing actions, or granting access. In red team engagements, pretext calls test the human element of security controls, measuring employee adherence to verification procedures and security awareness training effectiveness. MITRE ATT&CK maps this to T1566.004 (Phishing for Information: Voice) and T1598 (Phishing for Information).

Prerequisites

  • Written authorization specifying social engineering scope and boundaries
  • List of approved target employees (usually provided by client)
  • OSINT research on targets and organization
  • Spoofed caller ID capability (authorized for testing)
  • Call recording equipment (with legal consent as required)
  • Pretext scenarios approved by client

MITRE ATT&CK Mapping

Technique IDNameTactic
T1566.004Phishing: VoiceInitial Access
T1598Phishing for InformationReconnaissance
T1598.003Phishing for Information: Spearphishing VoiceReconnaissance
T1589Gather Victim Identity InformationReconnaissance
T1591Gather Victim Org InformationReconnaissance

Phase 1: OSINT and Target Research

# LinkedIn employee enumeration
theHarvester -d targetcorp.com -b linkedin -l 200

# Company org chart and employee roles
# Review LinkedIn, corporate website "About Us" / "Team" pages

# Technology stack identification
# Check job postings for technology references (VPN vendor, email, helpdesk tool)

# Phone system identification
# Call main line, note IVR options, department names, extension patterns

Key intelligence to gather:

  • Internal helpdesk phone number and procedures
  • IT department names and staff
  • VPN/remote access vendor (Cisco AnyConnect, Fortinet, Pulse Secure)
  • Corporate email format (first.last, flast, etc.)
  • Recent events (mergers, office moves, system upgrades)
  • Employee names, titles, departments

Phase 2: Pretext Development

Common Pretext Scenarios

IT Helpdesk Impersonation (Most Effective):

"Hi, this is [name] from the IT Service Desk. We're migrating everyone to the new VPN client this week, and I see your account hasn't been updated yet. I need to verify your current credentials to ensure the migration goes smoothly. Can you confirm your username and current password?"

Vendor/Contractor:

"Hi, I'm [name] from [known vendor]. We're doing an emergency patch deployment for [product] and I need remote access to your system. Could you help me connect via TeamViewer?"

Executive Assistant (Authority):

"This is [name] calling on behalf of [CFO name]. [He/She] needs an urgent wire transfer processed for a deal that's closing today. I'll email you the details, but we need this done in the next hour."

Building/Facilities:

"Hi, this is [name] from facilities management. We're updating the badge access system this weekend. I need to confirm your employee ID and current badge number so your access isn't interrupted."

Pretext Checklist

  • [ ] Is the pretext believable for this organization?
  • [ ] Does it create appropriate urgency without being threatening?
  • [ ] Does it align with OSINT findings (real dept names, real systems)?
  • [ ] Does it have a plausible reason for requesting information?
  • [ ] Is there a fallback if the target pushes back?
  • [ ] Has the client approved this specific pretext?

Phase 3: Call Execution

Call Structure

  1. Introduction (10 seconds): State name, department, reason for calling
  2. Building rapport (30 seconds): Reference something real (recent event, shared context)
  3. Authority establishment (20 seconds): Reference manager name, ticket number, urgency
  4. Information request (30 seconds): Ask for the target information naturally
  5. Handling objections: If challenged, respond calmly with prepared answers
  6. Closing (10 seconds): Thank them, leave no suspicion

Objection Handling

ObjectionResponse
"Can I call you back?""Of course, call the main helpdesk line and ask for [name]. But this needs to be done by EOD."
"I need to verify this""Absolutely, I appreciate your diligence. You can check with [manager name]."
"I was told never to give passwords""You're right, and normally we wouldn't ask. This is a special case because [reason]. I can have my manager call you."
"What's your employee ID?"Pivot: "It's [made-up ID]. Listen, I have 50 more people to call today. Can we just get this done?"
"I'll email IT instead""Sure, but the system migration happens tonight. If it's not done by then..."

Phase 4: Data Collection and Metrics

Track the following for each call:

MetricDescription
Target NameEmployee called
DepartmentTarget's department
Date/TimeWhen call was made
DurationLength of call
Pretext UsedWhich scenario
Information ObtainedWhat was disclosed
Credential DisclosedYes/No (and type)
Verification AttemptedDid target try to verify caller?
Reported to SecurityDid target report the call?
Social Engineering Score1-5 susceptibility rating

Phase 5: Reporting

Success Metrics

MetricTargetResult
Credential Disclosure Rate<10%XX%
Sensitive Info Disclosure Rate<20%XX%
Verification Rate>80%XX%
Security Reporting Rate>50%XX%

Ethical and Legal Considerations

  1. Always obtain written authorization before conducting vishing tests
  2. Never use threatening language or create genuine fear
  3. Document consent and legal requirements for call recording
  4. Protect disclosed credentials - immediately report to client
  5. Debrief targets after the engagement if client approves
  6. Never publicly identify specific employees who failed
  7. Comply with telecommunications laws in your jurisdiction

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC4.1 (Monitoring & Evaluation), CC7.1 (Monitoring)
  • ISO 27001: A.14.2 (Secure Development), A.18.2 (Information Security Reviews)
  • NIST 800-53: CA-8 (Penetration Testing), RA-5 (Vulnerability Scanning)
  • NIST CSF: ID.RA (Risk Assessment), PR.IP (Information Protection)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add conducting-social-engineering-pretext-call

# Or load dynamically via MCP
grc.load_skill("conducting-social-engineering-pretext-call")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

References

  • Verizon DBIR 2025: 74% of breaches involve human element
  • MITRE ATT&CK T1598: https://attack.mitre.org/techniques/T1598/
  • Social Engineering Penetration Testing by Gavin Watson (Syngress)
  • The Art of Deception by Kevin Mitnick (Wiley)
  • NIST SP 800-50: Building an Information Technology Security Awareness and Training Program

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add conducting-social-engineering-pretext-call
// Or via MCP
grc.load_skill("conducting-social-engineering-pretext-call")

Tags

social-engineeringvishingpretext-callsecurity-awarenessred-teamphishinghuman-risk

Related Skills

Penetration Testing

Conducting Social Engineering Penetration Test

6m·intermediate
Red Team & Offensive Security

Conducting Spearphishing Simulation Campaign

3m·intermediate
Red Team & Offensive Security

Performing Initial Access with Evilginx3

4m·intermediate
Red Team & Offensive Security

Conducting Domain Persistence with Dcsync

4m·intermediate
Red Team & Offensive Security

Conducting Internal Reconnaissance with BloodHound Ce

4m·intermediate
Red Team & Offensive Security

Conducting Pass the Ticket Attack

3m·intermediate

Skill Details

Domain
Red Team & Offensive Security
Difficulty
intermediate
Read Time
5 min
Code Examples
1
MITRE IDs
5

On This Page

OverviewPrerequisitesMITRE ATT&CK MappingPhase 1: OSINT and Target ResearchPhase 2: Pretext DevelopmentPhase 3: Call ExecutionPhase 4: Data Collection and MetricsPhase 5: ReportingEthical and Legal ConsiderationsReferencesVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →