Humans Are the Initial Access Vector
74% of breaches involve a human element — Verizon DBIR 2024
Measure What Awareness Training Actually Bought You
Almost every organization runs annual phishing training. Almost none actually know whether it works against a motivated attacker who has done their homework. Off-the-shelf phishing platforms catch only the easiest 5% of users — they don't simulate spear phishing, MFA fatigue, vishing of help desks, or pretexting against the finance team. Nomad's social engineering practice gives you ground-truth metrics by running the campaigns your awareness program is actually trying to defend against.
Campaign Types
The full spectrum of human-attack vectors
Phishing (Email)
Broad-spectrum and targeted email campaigns: credential phishing, attachment-borne payloads, OAuth-consent phishing, and reply-chain hijacking. AiTM proxies for MFA-bypass capture on request.
Spear Phishing
Highly targeted campaigns against named individuals: executives, finance, IT admins, developers. OSINT-driven, pretext-rich, with measurable individual-vs-cohort metrics.
Vishing (Voice)
Phone-based pretexting against help desks, IT support, and finance teams. The vector behind MGM, Caesars, and Twilio breaches. We test help-desk identity-verification scripts the way real attackers do.
Smishing (SMS)
SMS-based phishing with MFA-bypass focus: fake delivery notifications, fake IT support, fake bank fraud alerts. Rising 30% year-over-year and barely covered by most awareness programs.
MFA Fatigue / Push-Bombing
Test whether your users approve unsolicited push notifications — the technique used in the Uber and Cisco breaches. Combined with vishing for a realistic adversary-in-the-middle simulation.
Physical & In-Person
Tailgating, badge cloning, USB drops, and on-site pretexting. Available as a standalone engagement or paired with a full-scope red team.
Methodology
Ethical, measurable, and designed to build culture rather than blame users
Scoping & Rules of Engagement
We agree the target population, in-scope techniques, escalation paths, and the no-go list (e.g., no fake bereavement pretexts, no fake medical-emergency calls). Written authorization for every operator.
OSINT & Pretext Design
Public-source reconnaissance of your organization, recent news, M&A activity, vendor relationships, and individual targets. Pretexts are crafted to be plausible without exploiting personal trauma.
Infrastructure Build
Domain registration, mail-server warm-up, SPF/DKIM/DMARC tuning to land in inboxes, landing pages, and (where in-scope) AiTM proxies for live credential and MFA-token capture.
Campaign Execution
Phased launches across departments and roles to measure cohort differences. Vishing and smishing run during business hours; phishing waves are timed to test peak-vs-off-peak click rates.
Reporter Recognition
Users who report the phishing attempt receive immediate "thank you, this was a test" responses. Reporting rates are tracked alongside click rates — they're the more important metric.
Reporting & Awareness Tuning
Quantitative metrics (click, credential-submission, MFA-approval, reporting), qualitative narrative of what worked and why, and concrete recommendations for your awareness program — content, frequency, and targeting.
Common Use Cases
Awareness Program Effectiveness Baseline
Goal: Measure what your existing awareness training has actually delivered.
Approach: Multi-vector campaign (phishing + vishing + smishing) with department-level metrics. Repeat at 6 months to measure trend.
Help Desk Verification Hardening
Goal: Test the identity-verification process your help desk uses for password resets and MFA reset requests.
Approach: Vishing-only engagement with 20–40 attempted-reset calls against help desk, scored against your published verification procedure.
Initial-Access Vector for Red Team
Goal: Generate realistic initial access for a full-scope red team engagement.
Approach: Phishing campaign with implant payload; successful clicks hand off to the red team cell for post-exploitation.
BEC / Wire-Fraud Readiness
Goal: Test your finance team's resilience to business email compromise and CEO-fraud pretexts.
Approach: Targeted spear-phishing of AP and finance, combined with vishing impersonation of executives requesting urgent wire transfers.

Real Voice Operators
Vishing is where most firms quietly outsource — or skip entirely. Our operators have call-center, sales, and verbal-attack backgrounds. They sound like real people because they are.
Metrics That Matter
Click rate is the vanity metric. We report credential-submission rate, MFA-approval rate, time-to-report, and dwell time — the numbers that actually predict breach probability.
Culture-First Framing
Reporters are celebrated, clickers are educated, leadership gets the trends. Awareness programs that blame users produce users who hide their mistakes — we explicitly design against that.
Feeder for Red Team
Successful social-engineering access can hand off directly to a red team engagement — a far more realistic kill-chain than a planted foothold.
Social Engineering FAQ
Find Out What Your Awareness Training Actually Bought You
Real phishing, real vishing, real metrics — ethically conducted by senior operators.
Scope a Campaign