🔍 AcmeTech Corp — OSINT Lab

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Practice OSINT techniques on fake employees. Learn to identify phishing targets, build pretexts, and map company structure.

AcmeTech Corp — Org Chart

Attackers use org charts to identify who has authority to approve actions and who reports to whom — critical for Business Email Compromise (BEC).

David Walsh (CTO / Co-Founder) — d.walsh@acmetech.corp
├── Sarah Chen (Engineering Manager) — s.chen@acmetech.corp
│   ├── Ram Nukala (Junior Developer) — r.nukala@acmetech.corp
│   └── Alice Nguyen (Sr DevOps Engineer) — a.nguyen@acmetech.corp
├── Mike Torres (IT Administrator) — m.torres@acmetech.corp
├── Jessica Park (HR Director) — j.park@acmetech.corp
├── Tom Bridges (Finance Manager) — t.bridges@acmetech.corp
└── Bob Kumar (Sales Executive) — b.kumar@acmetech.corp
BEC Attack Example: Attacker emails Tom Bridges (Finance) impersonating David Walsh (CTO):
"Tom, I need an urgent wire transfer of $47,000 to a new vendor. I'm in a meeting, please process this today."
Tom trusts the request because he reports to David and the email looks legitimate.