Rhino Security Labs

Phishing Assessment Report

Included in every social engineering assessment report is a walkthrough of our assessment methodology. Structured and repeatable, this process details each stage of the engagement and how they fit together for greatest impact.

This methodology follows the following structure:

  1. Information Gathering
  2. Create Scenarios and Payloads
  3. Engage Targets
  4. Reporting and Debrief
  5. Remediation and Employee Training (Optional)