Dark Mode
Capec-410 Detail
Information Elicitation
Meta Social Engineering Software Typical Severity: Low
Children: 407
An adversary engages an individual using any combination of social engineering methods for the purpose of extracting information. Accurate contextual and environmental queues, such as knowing important information about the target company or individual can greatly increase the success of the attack and the quality of information gathered. Authentic mimicry combined with detailed knowledge increases the success of elicitation attacks.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-410 | capec | https://capec.mitre.org/data/definitions/410.html | |
| REF-348 | reference_from_CAPEC | http://www.social-engineer.org | The Official Social Engineering Portal, Social-Engineer.org, Tick Tock Computers, LLC |
Not present
Not present
Not present
Not present
Not present
Not present