The Human Layer
Technology alone cannot protect an organisation. The most sophisticated firewall in the world will not stop an employee who clicks a link, opens a door, or picks up a phone. Social engineering tests the layer that security tools cannot fully address: human behaviour.
Our social engineering campaigns replicate the tactics used by real threat actors — from nation-state APT groups to financially motivated criminals. We use OSINT to build targeted pretexts that are highly believable and contextually appropriate.
All campaigns are conducted within agreed rules of engagement. We never store real credentials, and all captured data is destroyed at engagement close.
From Recon to Reporting
Target Profiling & Pretext Development
We research your organisation, key personnel, and corporate culture using OSINT. We craft believable pretexts tailored to your sector — supplier invoices, IT support requests, HR communications.
Campaign Design & Infrastructure Setup
We build the infrastructure — phishing domains, lookalike pages, caller ID spoofing, and SMS gateways. Every campaign is designed to mirror real adversary tactics.
Execution & Data Collection
Campaigns are executed according to agreed rules of engagement. We track opens, clicks, credential submissions, and callback rates — without storing real credentials.
Analysis & Awareness Recommendations
We analyse results by department, role, and campaign type. You receive a full picture of your human attack surface and targeted recommendations for awareness training.
Every Angle, Tested
From targeted spear-phishing to physical intrusion, we test every vector that a real adversary would exploit against your people.
- Spear-phishing campaigns
- Vishing (voice phishing)
- Smishing (SMS phishing)
- Physical intrusion scenarios
- Tailgating tests
- Impersonation exercises
- USB drop campaigns
- Pretexting scenarios
What the Campaign Reveals
Click & Credential Rates
Detailed breakdown of click-through, credential submission, and reporting rates by department, role, and campaign type.
Employee Awareness Assessment
Heatmap of your human attack surface — which teams are most susceptible and to which vectors.
Campaign Report
Full documentation of campaign design, execution, infrastructure used, and individual interaction logs.
Awareness Training Recommendations
Tailored training recommendations based on real observed behaviour — not generic security awareness content.
Policy Gap Analysis
Review of your security policies against what we observed — identifying gaps in acceptable use, reporting, and verification procedures.
