• HubertManne@moist.catsweat.com
      link
      fedilink
      arrow-up
      31
      ·
      2 days ago

      or like a detailed report. I bet you could make a standard report and just change a few things and maybe pull the scam sometimes. The hardest part I think would be getting someone to accept from a cold call. Would need to be pretty stupid to do that to begin with.

      • mosiacmango@lemm.ee
        link
        fedilink
        arrow-up
        31
        ·
        edit-2
        2 days ago

        The reports list your hardware on them generally. They need access into your network.

        The truth is that instead of faking it, you just do an actual pentest. It is generally a mix of FOSS tools like kali, metasploit, nmap, etc and pay tools like nessus. These can all be automated.

        Charge the money, mail them a pre setup laptop, then hit the “go” button and still sit on your ass for a week.