Главная
Study mode:
on
1
Intro
2
Table of Contents
3
Introductions
4
What is spear fishing
5
White House spearfishing
6
Pentesting
7
Statistics
8
Target Research
9
Email Harvesting
10
Jigsaw
11
Fake Email
12
Create a Scenario
13
Email Subject
14
Email Layout
15
Attack Vector
16
Spearfishing
17
Changing Whois Data
18
Choosing the Payload
19
Postexploitation
20
Demo
21
Why User Awareness Isnt Working
22
How to Limit Exposure
23
Network Segmentation
Description:
Explore advanced phishing tactics and strategies that go beyond traditional user awareness in this conference talk from Hack3rcon 2012. Delve into the world of spear phishing, including high-profile examples like White House targeting. Learn about pentesting methodologies, statistics, and target research techniques. Discover email harvesting methods, creating convincing fake emails, and developing effective attack scenarios. Examine the importance of email subject lines, layout, and attack vectors in successful phishing campaigns. Gain insights into changing WHOIS data, selecting payloads, and post-exploitation techniques. Watch a live demonstration and understand why conventional user awareness approaches often fall short. Explore practical solutions for limiting exposure, including network segmentation strategies.

Advanced Phishing Tactics - Beyond User Awareness

Add to list