In order to send a highly targeted attack email, the attacker needs to identify the target.  How can an attacker identify targets?  The attacker needs names, functions, email addresses.  back | track 5r3 is a hacker tool which gives hackers the power to find those targets.

This is a video that shows back | track 5r3 being used to download a list of google employees including their names,  titles, departments, office locations, and email addresses:

Of course, a data dump is hard to use, so back | track 5r3 includes a feature to download the targeting data to a spearsheet.

usernames

Cybersecurity is focused on defending systems. In response, almost all state affiliated attacks target users.

Users must be changed from agents of infiltrators into cyber defenders. Spearphishers deceive people into making bad email decisions that compromise security. IT needs to help employees make better email processing decisions. That is where SP Guard comes into play. Using SP Guard, IT can determine a list of trusted senders and provide this information to staff in a simple and highly effective manner.

You can contact us at  408-727-6342,ext 3 or use our online form.