We will set up, prepare, run, and analyze a completely individual educational social engineering attack, much like a fully custom phishing campaign. Custom Templating: Depending on your needs we will create a custom Phishing, SMiShing, File-Based or a “Bad Media” (USB/DVD/CD) template we are going to use in your attack. The configuration of the LUCY server, including server configuration tasks, is also part of the service. Campaign execution: We will execute the campaign for you or you can start it yourself. Analysis and Debriefing: After successful completion we will prepare the report for you and we’ll support you in interpreting the campaign results. This service is provided only to owners of a LUCY commercial edition.
- Determine customer requirements
- Creation of a custom attack template
- Configuration of the campaign
- Domain reservation and configuration (if needed)
- User management and import (if needed)
- Up to 8 iterations for refinement
- Detailed analysis and reporting after running the campaign
- Debriefing and lessons learned workshop
- Support during campaign execution*
* Provided by certified partner or LUCY. The campaign services are dedicated to owners of a commercial edition.