Главная
Study mode:
on
1
Intro
2
A Novel Phishing Campaign Design
3
Fooling Humans for 50 Years
4
ISO: Demo Volunteers
5
Why Twitter?
6
Techniques, Tactics and Procedures
7
Design Flow
8
Triage of High Value Targets on Twitter
9
Choosing a URL shortener
10
Desirable properties of URL shortener
11
Recon and Footprinting for Profiling
12
Leveraging Markov Models
13
Training a Recurrent Neural Network
14
Tradeoffs and Caveats
15
Language and Social Network Agnosticism
16
Wild Testing SNAP R
17
Pilot Experiment
18
Man vs. Machine 2 Hour Bake Off
19
Potential Use Cases
20
Mitigations
21
Black Hat Sound Bytes
Description:
Explore an innovative approach to automated spear phishing on Twitter using machine learning and data science techniques. Learn how to leverage recurrent neural networks, clustering algorithms, and natural language processing to generate targeted phishing campaigns. Discover methods for identifying high-value targets based on social engagement metrics, and understand the process of creating personalized content using timeline data. Examine the effectiveness of this approach through real-world testing and comparisons to manual efforts. Discuss potential applications, ethical considerations, and mitigation strategies for this powerful social engineering technique. Gain insights into the intersection of offensive security, artificial intelligence, and social media exploitation.

Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter

Black Hat
Add to list