Главная
Study mode:
on
1
Intro
2
Disclaimer
3
3 Methodologies
4
Statistics : Phishing
5
Statistics : Impersonation
6
Types of Social Engineer
7
Why Social Engineering?
8
Common Attacks
9
Kevin Mitnick
10
Frank Abagnale
11
Charles Ponzi
12
Social Engineering Techniques
13
Information Gathering
14
Questioning Techniques
15
Funneling
16
Pretexting vs Elicitation
17
Manipulation - Fear
18
Manipulation - Guilt
19
Manipulation - Foot in the Door
20
Personal Mitigation Techniques
21
Corporate Mitigation Techniques
Description:
Explore social engineering techniques and protective measures in this 47-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain unauthorized access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Examine real-world examples from notorious figures like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Discover common attacks, information gathering methods, and questioning techniques used by social engineers. Understand manipulation strategies involving fear, guilt, and the "foot in the door" technique. Gain valuable insights into personal and corporate mitigation techniques to safeguard against social engineering threats.

Hacking Humans - Social Engineering Techniques and How to Protect Against Them

NDC Conferences
Add to list