Главная
Study mode:
on
1
Intro
2
FIRST STEP OF PWNING
3
CREEPER STATUS
4
CREEPER NO CREEPIN
5
ENCOUNTER OPHISHAL PPL
6
A REAL EXAMPLE...
7
FAIL!?!
8
SOMETHING MAGICAL HAPPENED
9
AND OF COURSE SEND...
10
HANGOUTS
11
DOES IT WORK?
12
ANOTHER REAL EXAMPLE (WHEN THINGS GO WRONG)
13
WHAT IF NO POWERSHELL?
14
CLIPBOARD MONITORING
15
SCREEN SHOTTING
16
RECORDING AUDIO
17
RECORDING VIDEO?
18
COOKIE STEALING
19
COOKIES = WIN
20
QUESTIONS?
Description:
Explore advanced social engineering techniques in this 45-minute conference talk from Derbycon 2015. Delve into the world of personal pwning, covering topics such as creeper status, encounter optimization, and phishing strategies. Learn from real-world examples, including both successes and failures, and discover alternative methods when PowerShell is unavailable. Gain insights into clipboard monitoring, screen capturing, audio recording, and cookie stealing. Understand the power of cookies in successful attacks and engage in a Q&A session to further expand your knowledge of social engineering tactics.

Pwning People Personally

Add to list