{"id":27345,"date":"2022-01-22T01:30:00","date_gmt":"2022-01-21T22:00:00","guid":{"rendered":"https:\/\/www.apk.co.ir\/?post_type=manual_kb&p=27345"},"modified":"2022-01-24T09:56:03","modified_gmt":"2022-01-24T06:26:03","slug":"social-engineering-penetration-test-why-do-a-social-engineering-test","status":"publish","type":"manual_kb","link":"https:\/\/www.apk.co.ir\/kb\/social-engineering-penetration-test-why-do-a-social-engineering-test\/","title":{"rendered":"\u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u06cc\u0627 Social Engineering \u0686\u06cc\u0633\u062a \u0648 \u0686\u0647 \u06af\u0627\u0645 \u0647\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc\u06cc \u062f\u0627\u0631\u062f – \u0642\u0633\u0645\u062a \u0627\u0648\u0644"},"content":{"rendered":"\n
\"\u0645\u0647\u0646\u062f\u0633\u06cc<\/figure><\/div>\n\n\n\n

\u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0632\u06cc\u0627\u062f\u06cc \u0628\u0631\u0627\u06cc \u0627\u0646\u062c\u0627\u0645 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u0646\u062f \u06a9\u0647 \u0648\u0636\u0639\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u06cc\u06a9 \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u0628\u0647\u0628\u0648\u062f \u0645\u06cc\u200c\u0628\u062e\u0634\u0646\u062f\u060c \u0627\u0645\u0627 \u062f\u0631 \u0627\u06cc\u0646 \u0645\u0642\u0627\u0644\u0647 \u0631\u0648\u06cc \u06cc\u06a9 \u0645\u0648\u0631\u062f \u062a\u0645\u0631\u06a9\u0632 \u062e\u0648\u0627\u0647\u062f \u0634\u062f \u0648 \u0622\u0646 \u0639\u0628\u0627\u0631\u062a \u0627\u0633\u062a \u0627\u0632 Social Engineering. \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc<\/strong> \u0631\u0648\u06cc \u0627\u0641\u0631\u0627\u062f \u0648 \u0641\u0631\u0627\u06cc\u0646\u062f\u0647\u0627 \u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0645\u0631\u062a\u0628\u0637 \u0628\u0647 \u0622\u0646\u200c\u0647\u0627 \u062a\u0645\u0631\u06a9\u0632 \u062f\u0627\u0631\u062f. \u0627\u06cc\u0646 \u062a\u0633\u062a\u200c\u0647\u0627\u06cc \u0646\u0641\u0648\u0630 \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u0634\u0627\u0645\u0644 \u06cc\u06a9 \u0647\u06a9\u0631 \u0627\u062e\u0644\u0627\u0642\u06cc \u0647\u0633\u062a\u0646\u062f \u06a9\u0647 \u062d\u0645\u0644\u0627\u062a Social Engineering \u0645\u062e\u062a\u0644\u0641\u06cc \u0645\u062b\u0644 Phishing\u060c USB Drop \u06cc\u0627 \u062c\u0639\u0644 \u0647\u0648\u06cc\u062a \u0631\u0627 \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u0627\u0641\u0631\u0627\u062f \u062f\u0631 \u0637\u0648\u0644 \u062f\u0648\u0631\u0647\u200c\u06cc \u06a9\u0627\u0631\u06cc \u062e\u0648\u062f \u0628\u0627 \u0622\u0646\u200c\u0647\u0627 \u0645\u0648\u0627\u062c\u0647 \u0645\u06cc\u200c\u06af\u0631\u062f\u0646\u062f. \u0647\u062f\u0641 \u0627\u0632 \u0627\u06cc\u0646 \u062a\u0633\u062a \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u06cc\u06a9 \u0641\u0631\u062f\u060c \u06af\u0631\u0648\u0647\u06cc \u0627\u0632 \u0627\u0641\u0631\u0627\u062f \u06cc\u0627 \u0641\u0631\u0627\u06cc\u0646\u062f\u0647\u0627 \u0648 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0628\u0627 \u0645\u0633\u06cc\u0631 \u0648\u0627\u0636\u062d\u06cc \u0628\u0631\u0627\u06cc \u0627\u0635\u0644\u0627\u062d \u0627\u0633\u062a. \u062f\u0631 \u0627\u06cc\u0646 \u0645\u0642\u0627\u0644\u0647 \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u06cc\u0646\u06a9\u0647 \u062d\u0645\u0644\u0647\u200c\u06cc \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0686\u06cc\u0633\u062a\u060c \u0686\u0631\u0627 \u0633\u0627\u0632\u0645\u0627\u0646 \u0647\u0627 \u0628\u0627\u06cc\u062f \u0627\u06cc\u0646 \u062a\u0633\u062a\u200c\u0647\u0627 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f\u060c \u0631\u0648\u0634\u200c\u0647\u0627\u06cc \u0645\u062a\u062f\u0627\u0648\u0644 \u0645\u0648\u0631\u062f\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0628\u0631\u0627\u06cc \u0627\u0646\u062c\u0627\u0645 \u062d\u0645\u0644\u0627\u062a \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0648 \u0646\u062d\u0648\u0647\u200c\u06cc \u0627\u0646\u062c\u0627\u0645 \u06cc\u06a9 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0628\u062d\u062b \u062e\u0648\u0627\u0647\u062f \u0634\u062f.<\/p>\n\n\n\n

\u062d\u0645\u0644\u0627\u062a \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u06cc\u0627 Social Engineering \u0686\u06cc\u0633\u062a\u061f<\/strong><\/h3>\n\n\n\n

\u062d\u0645\u0644\u0627\u062a \u0645\u0647\u0646\u062f\u0633\u06cc \u0627\u062c\u062a\u0645\u0627\u0639\u06cc \u0627\u0646\u0648\u0627\u0639 \u0645\u062e\u062a\u0644\u0641\u06cc \u062f\u0627\u0631\u0646\u062f\u060c \u0627\u0645\u0627 \u0645\u062a\u062f\u0627\u0648\u0644\u200c\u062a\u0631\u06cc\u0646 \u0646\u0648\u0639 \u0627\u06cc\u0646 \u062d\u0645\u0644\u0627\u062a\u060c Phishing \u060cVishing \u060cSmishing\u060c \u062c\u0639\u0644 \u0647\u0648\u06cc\u062a\u060c \u0632\u0628\u0627\u0644\u0647\u200c\u06af\u0631\u062f\u06cc \u06cc\u0627 Dumpster Diving\u060c USB Drop \u0648 Tailgating \u0647\u0633\u062a\u0646\u062f.<\/p>\n\n\n\n

Phishing<\/strong><\/strong><\/h4>\n\n\n\n

Phishing \u0631\u0648\u0634\u06cc \u0627\u0633\u062a \u06a9\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u06cc\u0645\u06cc\u0644 \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0633\u0639\u06cc \u0645\u06cc\u200c\u06a9\u0646\u062f \u06a9\u0627\u0631\u0628\u0631 \u0631\u0627 \u0641\u0631\u06cc\u0628 \u062f\u0647\u062f \u062a\u0627 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u06cc \u0631\u0627 \u062a\u0633\u0644\u06cc\u0645 \u06a9\u0631\u062f\u0647 \u06cc\u0627 \u06cc\u06a9 \u0641\u0627\u06cc\u0644 \u0645\u062e\u0631\u0628 \u0631\u0627 \u0628\u0627\u0632 \u0646\u0645\u0627\u06cc\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0648\u062c\u0628 \u0622\u0644\u0648\u062f\u06af\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0648\u06cc \u0634\u0648\u062f.<\/p>\n\n\n\n

Vishing<\/strong><\/strong><\/h4>\n\n\n\n

Vishing \u0634\u0628\u06cc\u0647 \u0628\u0647 Phishing \u0627\u0633\u062a \u0627\u0645\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0645\u0627\u0633\u200c\u0647\u0627\u06cc \u062a\u0644\u0641\u0646\u06cc \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc\u200c\u0634\u0648\u062f. \u062f\u0631 \u0627\u06cc\u0646 \u062a\u0645\u0627\u0633\u200c\u0647\u0627\u06cc \u062a\u0644\u0641\u0646\u06cc \u0633\u0639\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0627\u0631\u0628\u0631 \u0641\u0631\u06cc\u0628 \u062f\u0627\u062f\u0647 \u0634\u0648\u062f \u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633\u06cc \u0631\u0627 \u062a\u0633\u0644\u06cc\u0645 \u0646\u0645\u0627\u06cc\u062f.<\/p>\n\n\n\n