Precursor Security
CREST-Accredited | Multi-Vector | UK

SocialEngineeringPenetrationTesting

Your technical controls are hardened. Your human layer is untested. We conduct CREST-accredited social engineering penetration tests across phishing, vishing, physical intrusion, and executive impersonation vectors, producing evidence-grade findings your auditors, board, and regulators will accept.

CREST-accredited delivery
Covers phishing, vishing, physical & pretexting
Fixed-price from £5,000
Findings mapped to ISO 27001, DORA, PCI DSS, NHS DSPT
Scroll
Methodology

Six Attack Vectors.
One Engagement.

Each engagement begins with open-source intelligence gathering to build organisation-specific pretexts, not generic template attacks. We test every entry point your employees represent: email, voice, physical access, and executive impersonation.

Email Vector

Spear Phishing Campaigns

OSINT-built spear phishing campaigns using harvested employee data from LinkedIn, company directories, and public filings. We test credential submission, attachment execution, and link-click rates, with immediate teachable moment delivery to users who interact.

Voice Vector

Vishing (Voice Phishing)

Scripted vishing calls to your helpdesk and target employees, using pretext personas developed during OSINT. We test whether your team follows password reset procedures, discloses sensitive data, or bypasses verification under social pressure.

Physical Vector

Physical Security Testing

Authorised physical intrusion attempts: tailgating, badge cloning, USB drop testing, and rogue device placement. All physical testing is conducted under a signed RoE with authorisation letters carried by testers at all times.

Intelligence

Pretexting & OSINT

Open-source intelligence gathering across LinkedIn, Companies House, social media, and job postings to map your employee attack surface. Pretext personas are built from real-world data, not generic scenarios.

Fraud Simulation

Executive Impersonation

BEC and CEO fraud simulations targeting finance, HR, and executive assistants. We test whether financial controls and verification procedures hold under targeted impersonation pressure, coordinated with your finance team to prevent actual payment processing.

Mobile Vector

Smishing (SMS Phishing)

Targeted SMS and messaging campaigns using spoofed sender IDs and organisation-specific pretexts. We test whether employees recognise and report malicious links delivered via mobile channels, a vector often excluded from platform-based phishing simulations.

Executive Summary

The Human Attack Surface

Your people are the most targeted entry point, and the most under-tested. 74% of all breaches involve the human element.

Critical
74%

Human Element

Of all breaches involve the human element: credentials, social engineering, or human error. Verizon DBIR 2024.

Fixed Price
£5,000

Starts From

Fixed-price social engineering penetration testing. No day-rate surprises. Multi-vector combined assessments from £10,000.

Measurable
11x

Click Rate Reduction

Average reduction in simulated phishing susceptibility after three targeted testing and training cycles. Proofpoint Security Awareness Report.

Mapped
Controls
ISO 27001A.6.3 & A.8.7
PCI DSS 4.0Req 12.6
DORAArt. 26 TLPT
NHS DSPTStandard 9
Decision Aid

Why Managed Testing, Not a SaaS Platform?

The decision between a SaaS phishing platform and a CREST-accredited managed service determines whether your findings carry regulatory weight.

SaaS Phishing Platform

  • Generic template library
  • Email vector only
  • No CREST accreditation
  • Automated dashboard
  • Click rate data only
  • Ongoing awareness tool

CREST Managed Testing

  • OSINT-built, organisation-specific scenarios
  • Phishing + vishing + physical + pretexting
  • CREST-accredited findings accepted by regulators
  • Analyst-authored report with remediation
  • Evidence-grade report for ISO 27001, DORA, PCI DSS
  • Point-in-time penetration test for audit compliance

For organisations running an ongoing phishing awareness programme, our phishing simulation service sits alongside your existing tooling, providing expert-authored campaigns and analyst debrief that platforms cannot. For audit or regulatory compliance, our CREST-accredited assessment produces the evidence-grade report your auditors require.

Scope Options

Attack Vector Coverage

Three engagement tiers. Every scope includes OSINT reconnaissance, analyst-authored findings, and compliance-ready reporting.

Vector
Phishing Only
From £5,000
Combined
From £10,000
Full Scope
From £15,000+
Spear phishing
Mass phishing
Vishing
Smishing (SMS) Optional
Physical intrusion
Executive impersonation
USB drop testing
OSINT report
Auditor Ready

Mapped directly to your regulatory controls.

Social engineering penetration testing provides evidence-grade documentation for regulated industries across the UK and EU.

ISO 27001:2022

A.6.3

Information security awareness: documents baseline click rates and post-test improvement trajectory

ISO 27001:2022

A.8.7

Protection against malware: tests real-world effectiveness of controls under human manipulation

PCI DSS v4.0

Req 12.6

Security awareness programme: provides documented testing evidence required for QSA review

DORA (EU 2022/2554)

Art. 26

Advanced threat-led testing: social engineering is a required TLPT component

NHS DSPT

Standard 9

Staff awareness testing and documented outcomes for NHS data security compliance

Cyber Essentials

Beyond Scope

Demonstrates controls beyond CE scope, strengthens renewal position and cyber insurance

CREST

Globally Accredited Consultants

All testing is conducted by CREST-certified professionals.

Verify Accreditation
Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Reconnaissance

Passive OSINT gathering across LinkedIn, Companies House, social media, and public job postings. We map your employee attack surface (names, roles, reporting structures, technology stack signals) to build authentic, organisation-specific pretexts.

Step 02

Scenario Planning

Pretext development based on OSINT findings. Scenarios are built around your actual infrastructure (your IT helpdesk ticketing system, your email domain, your leadership team names). All scenarios are approved by you in the Rules of Engagement before execution.

Step 03

Execution

Multi-vector campaign execution across agreed testing windows. Phishing campaigns, vishing calls, and physical intrusion attempts are run concurrently or in sequence per your RoE. All activity is monitored in real time with immediate abort capability.

Step 04

Report & Debrief

Analyst-authored findings report with click rates, credential submission rates, vishing success rates, and physical access outcomes, benchmarked against industry averages. Anonymised by default, with a heat map of high-risk departments.

Deliverables

What You Get

Every social engineering penetration test includes the following deliverables, formatted for both security teams and non-technical stakeholders.

Comprehensive social engineering report with anonymised metrics: click rates, credential submission rates, and reporting rates
Detailed breakdown of each scenario with success rates and employee interaction timeline
Specific teachable moment examples showing the red flags employees missed
Comparison against industry benchmarks for your sector
Actionable recommendations for security awareness training topics and policy improvements
Executive summary suitable as compliance evidence for ISO 27001, PCI DSS, DORA, and NHS DSPT auditors

Reports are delivered via encrypted portal. Standard phishing campaigns deliver findings within 5 business days. Combined engagements within 10 business days.

After Testing

Close the Loop.
After the Test.

Your social engineering test identifies where the human layer is vulnerable. We feed those exact findings into our 24/7 Managed SOC and Microsoft 365 MDR, building custom detection rules for phishing attacks that reach your users and continuously monitoring for account compromise between annual tests.

Explore Defensive Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Social engineering in cyber security refers to manipulation techniques that exploit human psychology rather than technical vulnerabilities to gain unauthorised access to systems, data, or physical premises. Unlike technical attacks that target software flaws, social engineering attacks exploit trust, authority, urgency, and fear. Common social engineering techniques include phishing (email-based deception), vishing (voice-based manipulation), pretexting (building a false identity or scenario), tailgating (gaining physical access by following authorised personnel), and baiting (leaving infected devices for victims to find). Social engineering is responsible for the initial access stage in the majority of successful cyber attacks, making human security testing an essential component of any penetration testing programme.

Phishing simulation platforms (such as KnowBe4, Proofpoint Attack Simulation, or Microsoft Attack Simulator) provide self-service tools for running ongoing staff awareness campaigns using template-based emails. Social engineering penetration testing is a structured professional assessment conducted by CREST-accredited testers, using OSINT-built pretexts specific to your organisation rather than generic templates. The key differences: (1) A penetration test covers multiple attack vectors (phishing, vishing, physical, pretexting) while platforms typically cover email only; (2) A penetration test produces evidence-grade findings accepted by auditors, regulators, and cyber insurers. Platform dashboards typically do not. (3) A penetration test is a point-in-time professional assessment while platforms are designed for ongoing awareness programmes; (4) CREST-accredited testing carries regulatory weight for ISO 27001, DORA, PCI DSS, and NHS DSPT audits that self-service platforms do not. Both have a role: platforms for continuous awareness, professional testing for audit and compliance evidence.

Yes. Phishing awareness training is a natural complement to social engineering testing. After completing a phishing simulation or full social engineering penetration test, Precursor can provide targeted security awareness training sessions addressing the specific red flags and techniques employees missed during testing. Training options include: department-specific workshops for high-risk groups (finance, IT helpdesk, executive assistants), immediate teachable moment notifications to users who interact with simulations, and written security awareness guidance mapped to your test findings. For organisations requiring evidence of security awareness training for ISO 27001, Cyber Essentials, or cyber insurance renewals, we provide documented training completion records alongside testing reports.

Social engineering penetration testing typically ranges from £5,000 to £10,000+ depending on scenario complexity, number of employees targeted, and testing types (phishing-only vs combined phishing + vishing + physical intrusion). A standard phishing campaign for 100-200 employees averages £4,500 covering multi-scenario email testing with click rate analysis and credential harvesting simulation. Vishing testing targeting 20-30 employees typically costs £5,000-£6,000. Combined assessments including phishing, vishing, and physical intrusion testing typically cost £7,000-£10,000. We provide fixed-price quotes after understanding your organisation size, employee count, and testing objectives.

Yes, social engineering testing is legal when conducted under strict Rules of Engagement (RoE) that you approve in writing before testing begins. We operate within ethical boundaries: (1) We do not impersonate law enforcement, regulators, emergency services, or government officials. (2) We do not cause psychological harm, emotional distress, or create unsafe situations. (3) We do not commit actual crimes (real fraud, genuine trespassing without authorization, breaking and entering). (4) Physical intrusion attempts are coordinated with your facilities team with authorisation letters carried at all times. (5) We immediately identify ourselves if confronted and do not escalate confrontations. (6) All testing scenarios are approved in advance. If we successfully gain unauthorised access or compromise credentials, we immediately stop and document the security gap without exploiting it further.

When conducted properly, social engineering testing improves security culture rather than damaging morale: (1) Frame testing as skills development. Inform employees generally that periodic security testing occurs (without revealing specific dates) so it is viewed as training, not entrapment. (2) Immediate teachable moment education. Employees who fall for simulations receive positive, educational feedback explaining the red flags they missed, not punitive action. (3) Positive reinforcement. Employees who correctly identify and report simulations are recognised. (4) Leadership buy-in. Executives participate in testing to demonstrate security is everyone's responsibility. (5) Trend analysis over punishment. Metrics focus on improving organisation-wide awareness, not identifying individual failures. Organisations using this approach see improved reporting rates and engaged security culture.

No, not during the test. That defeats the purpose of measuring realistic security awareness. However, we recommend: (1) Inform employees generally that periodic security testing will occur throughout the year (without revealing specific dates or scenarios) to frame it as skills development rather than a gotcha exercise. (2) During the test, employees experience realistic scenarios without knowing it is simulated. (3) Immediately after an employee interacts with the simulation, they receive a teachable moment screen or message explaining it was a test and the security lesson. (4) Post-campaign, aggregate results are shared organisation-wide with focus on trends and improvement rather than individual blame. This approach balances realism with fairness.

Our testing includes safety mechanisms to prevent real harm: (1) Phishing links lead to controlled landing pages that immediately display a security test notification. (2) Vishing scenarios include abort procedures. If an employee attempts to transfer real money or share truly sensitive data, we immediately identify ourselves and stop. (3) Physical intrusion tests do not involve taking actual property or accessing sensitive areas beyond proving access was possible. (4) Financial scenarios (BEC/CEO fraud simulations) are coordinated with finance teams to flag and block actual payment attempts. (5) All testing is monitored in real-time allowing immediate intervention if scenarios escalate beyond safe testing boundaries. We measure willingness to comply with fraudulent requests, not actual fraud completion.

Yes, targeted social engineering testing is often more effective than company-wide campaigns: (1) Finance department targeting: testing susceptibility to Business Email Compromise and wire transfer fraud specifically in accounts payable. (2) IT helpdesk targeting: vishing campaigns testing if support staff reset passwords without proper verification. (3) Executive targeting: testing if C-level executives and their assistants fall for targeted spear-phishing. (4) High-privilege user targeting: focusing on sysadmins, DBAs, and other users with elevated access. (5) Department-specific scenarios: crafting realistic scenarios for each department (HR: fake job applications, Sales: fake leads, IT: fake security alerts). Targeted testing provides deeper insights than broad campaigns while minimising organisation-wide disruption.

We implement strict data protection controls for any information captured during simulations: (1) No plaintext storage. Captured credentials are immediately hashed or encrypted, never stored in readable format. (2) Isolated testing infrastructure. Simulation servers are segregated from production networks. (3) Immediate secure disposal. All captured data is securely deleted immediately after the debrief, typically within 48 hours of campaign completion. (4) Access controls. Only designated security consultants have access to testing data, with full audit logging. (5) Encrypted reporting. Results are delivered via encrypted channels with personally identifiable information anonymised in reports. (6) Compliance. All data handling follows GDPR Article 32 requirements for processor security obligations.

You receive: a comprehensive social engineering report with anonymised metrics (click rates, credential submission rates, reporting rates); detailed breakdown of each scenario with success rates; a heat map identifying high-risk departments or user groups; timeline of employee interactions showing how quickly users fell for simulations or reported them; specific teachable moment examples showing the red flags employees missed; comparison against industry benchmarks; and actionable recommendations for security awareness training topics and policy improvements. The report is suitable as compliance evidence for ISO 27001, PCI DSS, DORA, and NHS DSPT auditors. The goal is actionable intelligence for improving your security culture, not shaming employees who clicked.