A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


How I Got Network Creds Without Even Asking: A Social Engineering Case Study - Jen Fox GrrCON 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

How I Got Network Creds Without Even Asking: A Social Engineering Case Study
Jen Fox
GrrCON 2015

On a professional pen testing engagement,why is one call or phish pretext selected over another? Why does it work (or not)? This case study describes how an SE pen testing engagement used a combination of exploits - phishing, vishing, and a spoofed site to successfully gain network credentials without even asking for them. Learn why the pretexts and exploits were selected for the engagement and how and why they worked. See the email! Hear the calls! See the site! This presentation is ideal for attendees who understand some social engineering basics but want to learn more about how an SE engagement works

Back to GrrCON 2015 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast