Social Engineering Testing & Phishing Simulations
Your technical defences mean nothing if an employee clicks the wrong link or holds the door open for a stranger. We run realistic, measurable social engineering campaigns that expose human risk before real attackers exploit it — phishing simulations, executive whaling, vishing, pretexting, USB drops, and physical access testing, all delivered by a CREST-certified principal consultant with 15 years of offensive security experience.
Why Human Risk Is Your Largest Attack Surface
Industry data consistently shows that the majority of successful breaches begin with a human — not a software vulnerability. Attackers invest heavily in social engineering because it works: a convincing pretext bypasses firewalls, EDR, and MFA alike. Social engineering penetration testing gives you an objective, evidence-based measurement of your organisation's susceptibility before a threat actor runs the same campaign for real.
At Cyber Security Pentesting Inc., every social engineering assessment is scoped and executed by Arturs Stay — principal consultant, CREST-certified, OSCP/OSEP credentialed, and 15 years in offensive security. We build custom pretexts, register lookalike domains, clone portals, and craft voice scripts tailored to your industry and threat landscape. You receive per-department risk scores, department-level click and credential metrics, and a prioritised security awareness roadmap that your HR, IT, and executive leadership teams can act on immediately.
Attack Campaigns We Run
Every campaign uses real attacker tradecraft. We do not rely on off-the-shelf phishing platforms with default templates. Each engagement is built from scratch to reflect the threats your organisation actually faces.
What We Measure
Social engineering testing without rigorous measurement is theatre. Every campaign we run produces quantified, benchmarkable data that your CISO, security team, and board can act on. The metrics below are tracked at the individual, department, and organisational level.
Deliverables
Every social engineering engagement concludes with a structured report package designed for three audiences: your technical security team, your HR and L&D function, and your executive leadership or board. Findings are never sent by email — we deliver reports in a secure debrief session and walk through every metric, scenario outcome, and recommendation.
- Executive Summary — Non-technical narrative of campaign scope, key findings, overall human risk rating, and strategic recommendations for leadership and audit committees.
- Per-Department Risk Scores — Composite risk rating for every department tested, with individual breakdown by campaign vector: phishing click rate, credential submission rate, vishing susceptibility, and physical access outcomes. Includes comparison to prior engagement baselines if available.
- Individual Interaction Log — Timestamped record of every tracked interaction (link click, credential entry, USB plug-in, call response) with anonymisation options available to comply with your HR policies.
- Campaign Technical Appendix — Full technical detail on every pretext built, domain registered, landing page deployed, and payload used — with screenshots and source artefacts for your security team's review.
- Security Awareness Recommendations — Tailored, prioritised training programme recommendations for each department and risk tier, including suggested content, delivery format, and re-test timeline. Mapped to real-world threats facing your industry.
- Physical Intrusion Evidence Package — Photographic documentation of every physical access control bypassed, with timestamps, access path narrative, and remediation recommendations for your facilities and physical security teams.
- Remediation Roadmap — Prioritised list of technical and process controls to implement — email gateway tuning, MFA enforcement, physical access hardening, and reporting workflow improvements — each with a recommended implementation timeline.
- Re-Test Baseline Data — All campaign metrics retained in a structured format to enable direct comparison in future engagements, demonstrating measurable improvement in your security culture over time.
Methodology References
Our social engineering assessments are grounded in established industry standards and frameworks. We do not invent our own methodology — we apply the standards your auditors, regulators, and insurers recognise.
- NIST SP 800-61 r3 — Incident Response Handling — Informs how we structure time-to-report measurement and evaluate your organisation's detection and escalation capabilities in the context of a live social engineering incident.
- Social-Engineer Penetration Testing (SET — Social Engineering Toolkit) — The industry-standard open-source framework for phishing infrastructure, credential harvesting portals, and payload delivery. Deployed alongside custom tooling developed in-house.
- MITRE ATT&CK — Initial Access (TA0001) — Campaign TTPs are mapped directly to MITRE ATT&CK Initial Access techniques including T1566 (Phishing), T1566.001 (Spearphishing Attachment), T1566.002 (Spearphishing Link), T1091 (Replication Through Removable Media), and T1200 (Hardware Additions). Findings reference specific technique IDs to enable threat intelligence and detection engineering alignment.
- PTES — Penetration Testing Execution Standard, Social Engineering Section — Governs our engagement scoping, rules of engagement documentation, and campaign execution phases.
- OWASP Testing Guide — Identity Management and Authentication Testing — Applied to credential harvesting analysis and MFA bypass scenario design.
Combine Social Engineering with Other Assessments
Social engineering is most powerful when combined with technical testing. Threat actors chain human and technical attacks — your assessment programme should too. These services pair directly with social engineering testing.
Tell us your industry, headcount, and what you are most concerned about. We will scope a social engineering testing programme sized to your organisation, agree rules of engagement that satisfy your legal and HR teams, and deliver measurable results within a clearly defined timeline.
Request a Social Engineering Assessment →