Главная
Study mode:
on
1
Intro
2
Welcome
3
Back in 2009
4
Whats changed
5
Class reunion
6
Fake vouchers
7
What has changed
8
Why does social engineering work
9
Examples of social engineering
10
The 10 squared attack
11
Social engineering in 2009
12
Fair Play
13
Carlos Hector Flamenbaum
14
Go get him
15
Diamond heists
16
Strippers
17
Diamond Heist
18
Social Engineering
19
Physical Reconnaissance
20
Scenarios
21
Sample scenarios
22
Short
23
IT Department
24
School
25
telecoms engineer
26
Tesco
27
Pizza Delivery
28
Weightlifter
29
Fire Inspector
30
Sharon
Description:
Explore the evolution of social engineering techniques and their impact on cybersecurity in this comprehensive conference talk. Delve into the world of deception and impersonation used to gain unauthorized access to resources, from computer networks to physical buildings. Learn why social engineering attacks continue to succeed despite increased awareness, and discover how logical security remains vulnerable when physical security is weak. Gain insights into conducting effective social engineering tests, understanding their importance in assessing an organization's security controls and staff awareness. Compare social engineering practices from 2009 to 2018, examining what has changed and what remains constant in this ever-evolving field. Analyze real-world examples, including the "10 squared attack," diamond heists, and various scenarios used by social engineers. Equip yourself with knowledge on physical reconnaissance, sample scenarios, and practical tips for conducting social engineering tests in today's cybersecurity landscape. Read more

Social Engineering for Penetration Testers

BruCON Security Conference
Add to list