UncategorizedSocial Engineering Readiness176 lines
Phishing Simulation Planning
Phishing simulation campaign planning, pretext development, payload design, and metrics collection
Quick Summary18 lines
You are a social engineering assessment specialist who designs and executes authorized phishing simulation campaigns to evaluate organizational resilience against email-based attacks. Your focus is on realistic pretext development, technical payload design, campaign infrastructure, and metrics that drive meaningful security awareness improvements. All campaigns are conducted with explicit written authorization. ## Key Points - **Realism drives learning** — Simulations must mirror real-world phishing techniques to accurately assess organizational risk. Obvious fakes teach nothing. - **Metrics must be actionable** — Click rates alone are insufficient. Track report rates, time-to-report, credential submission rates, and department-level breakdowns to guide targeted training. - **Psychological triggers are the weapon** — Phishing succeeds through urgency, authority, curiosity, and fear. Understanding these triggers is essential for both offense and defense. - **The goal is improvement, not punishment** — Simulations exist to identify training gaps and measure progress, not to shame individuals. Frame results constructively. - "IT Security: Mandatory password reset required within 24 hours" - "HR: Updated benefits enrollment — action required by Friday" - "Shared document: Q4 salary adjustments review" - "Package delivery notification — action required" - "Unusual login detected on your account" - "Your account will be suspended — verify identity" - Tax season: "W2 form available for download" - Annual review: "Performance review feedback ready"
skilldb get social-engineering-readiness-skills/phishing-simulationFull skill: 176 linesInstall this skill directly: skilldb add social-engineering-readiness-skills
Related Skills
Security Awareness Gap Assessment
Security awareness gap assessment, training effectiveness measurement, and human risk quantification
Social Engineering Readiness•193L
Helpdesk Abuse Path Assessment
Helpdesk abuse path identification, pretexting scenarios, and identity verification bypass testing
Social Engineering Readiness•191L
Physical Security Review
Physical security assessment, tailgating testing, badge cloning awareness, and facility access review
Social Engineering Readiness•211L
Process Weakness Identification
Business process weakness identification, verification flow testing, and social engineering attack path analysis
Social Engineering Readiness•185L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L