Skip to main content
Home / Services / Social Engineering & Phishing Simulations

Social Engineering & Phishing Simulations

Test your human attack surface with realistic social engineering campaigns

2-4 weeks Starting at $5,000
Social Engineering Results 3 BREACHES
Vishing Campaign4/12 employees gave credentials
33% success rate
Phishing Campaign18% click rate, 7% submitted creds
Physical access attempted
Physical InfiltrationGained server room access via tailgating
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

Social engineering is the most common initial access vector in real-world breaches. Our social engineering assessments simulate phishing emails, vishing calls, pretexting scenarios, and physical social engineering to measure how well your employees detect and respond to manipulation attempts.

Our Process

What We Test & How

What We Test

We test your organization's resilience to phishing emails (credential harvesting, payload delivery, business email compromise), vishing (voice phishing calls), smishing (SMS-based attacks), pretexting (impersonation scenarios), and physical social engineering (badge cloning, tailgating, dumpster diving). We measure click rates, credential submission rates, and reporting rates.

Our Approach

We design custom campaigns that mimic the exact tactics threat actors use against your industry. Each campaign uses realistic pretexts, branded landing pages, and multi-stage attack chains. We track every interaction and provide detailed analytics on who clicked, who submitted credentials, who reported the attempt, and how long it took. Results feed directly into security awareness recommendations.

Deliverables

What You'll Receive

Everything included in your engagement report.

Campaign design and pretext documentation

Phishing simulation results with full analytics

Click rate, credential submission, and reporting metrics

Department and role-based breakdown analysis

Vishing call recordings and results (if applicable)

Security awareness gap analysis

Targeted training recommendations by department

Benchmark comparison against industry averages

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

OSINT reconnaissance on target organization

2

Custom phishing pretext and payload development

3

Email campaign deployment with tracking

4

Credential harvesting landing page setup

5

Vishing and pretexting call campaigns

6

Physical social engineering attempts

7

Results analysis and metric generation

8

Security awareness program recommendations

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

High Phishing Click Rates (>20%) Credential Submission Without Verification Low Security Incident Reporting Rates Susceptibility to Authority-Based Pretexts Weak Email Filtering and DMARC Configuration Tailgating and Badge Cloning Vulnerabilities Lack of MFA on Critical Systems No Formal Phishing Response Procedures
Who It's For

Ideal For

Organizations Preparing for Compliance Audits
Companies Measuring Security Awareness ROI
Enterprises with Large Employee Bases
Financial Services and Healthcare
Government and Defense Contractors
Any Organization Training Security Awareness
Compliance

Standards We Support

SOC 2 ISO 27001 NIST 800-53 PCI-DSS HIPAA CMMC

Ready to Get Started?

$5,000

Typical engagement: 2-4 weeks

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!