A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Advanced Phishing Tactics – Beyond User Awareness Hack3rcon 3 (Hacking Illustrated Series InfoSec Tutorial Videos)

Advanced Phishing Tactics – Beyond User Awareness
Hack3rcon 3

Over the past 10 years, organizations have spent time, resources and considerable financial investments to protect their external perimeter from potential information security threats. Most advanced threat agents know if and when they bypass the hardened perimeter, successfully compromising assets within the internal environment is trivial, with very few controls in place to stop a focused and motivated intruder.

This talk will discuss why spear phishing penetration testing is a necessary exercise for all organizations. We will walkthrough and demonstrate live our methodology that has proven extremely effective on numerous engagements. We will also focus on why advanced techniques should be used to assess internal user environments as a whole and that approaching a social engineering exercise as a user awareness exercise is not beneficial for an enterprise.

Martin Bos

Martin “Pure Hate” Bos Martin (purehate) Bos works as a penetration tester for Accuvant Inc.. He resides in Louisville, KY with his wife, Kim and their 2 children. Martin is also one of the core developers for Backtrack-Linux and has been with the pro

Eric Milam

Senior Security Assessor – Accuvant LABS – Accuvant, Inc.\nEric is a security consultant on the Accuvant assessment team with over 14 years of experience in information technology. Eric performs ongoing enterprise security assessments, perimeter penetratio 

Back to Hack3rcon 3 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast