Главная
Study mode:
on
1
Intro
2
Transit Systems
3
Social Functions
4
Client Side Attacks
5
Client Side Surveillance
6
Answer: Kids!
7
Frameworks and Automation
8
Out of Alignment
9
Outside of the Lab
10
Business Recalibration
11
Traditional Phishing
12
How it should be Done
13
Phishing for Value
14
Preparation
15
Proxy Cleansing
16
Architecture
17
Tracking Results
18
It's Not Just About Metrics
19
Attacker Prep
20
Phishing Techniques
21
Live Bait Fishing (Netting)
22
OWA Enumeration
23
VPN Privileges
24
Phish In The Middle (PiTM)
25
Side Channels
26
Chum and Clean
27
The Response
28
You Called?
29
The Cleaner
30
Prepare for Incident Response
31
Prepare for ISP Abuse Alerts
32
Dealing with Legal Counsel
33
Out of Scope Shells
Description:
Explore advanced social engineering techniques and strategies in this DerbyCon 3.0 conference talk. Delve into various aspects of social engineering, including transit systems, social functions, client-side attacks, and surveillance methods. Learn about frameworks, automation, and business recalibration approaches. Discover innovative phishing techniques, such as traditional methods, value-based phishing, and live bait fishing. Gain insights into preparation, proxy cleansing, architecture, and result tracking. Understand the importance of attacker preparation, OWA enumeration, VPN privileges, and side channels. Examine response strategies, incident preparation, and legal considerations. Enhance your social engineering skills and stay ahead of potential threats in this comprehensive presentation.

Cheat Codez - Level Up Your SE Game

Add to list