The initial data.
Telegram channel: https://t.me/protectioninformation
Telegram Group: https://t.me/informationprotection1
Website: https://legascom.ru
Email: online@legascom.ru
First of all, let's agree on what the attacker knows. Let's assume that he doesn't have any insiders in the company itself who can provide information of interest. We also agree that the hacker does not violate the law. He doesn't use all kinds of listening devices, "bugs", hidden cameras, and so on. We will not use any specialized utilities. All information will be obtained exclusively from open sources.
Let him only know the name of the company whose network he needs to hack. Someone will think that this is not enough to start hacking, and they will be wrong.
By entering the company's name in the search engine, the attacker will quickly find its official website. There is hardly a single self-respecting organization that does not have its own website right now. And advertising, as you know, is the engine of commerce, and not only standard phones and e-mails can be used for communication, but also more modern means of communication, such as messengers. In the context of remote network analysis, we are most interested in email and Telegram. Many specialists often use mobile phone numbers as contacts. In this case, we can use the methods mentioned earlier.
Also on the corporate portal, in addition to contact information, there is usually a Vacancy section. Let's start collecting information from this point.




