This presentation is an exploration of the latest tools used in the art of
social engineering. From information gathering to post exploitation,
participants will get to experience “the thrill of the con” from a presenter who
lives it each day. The presentation also seeks to prove that you don’t have to
be a sleazy ‘salesman’ type personality to be successful at social engineering.
With the right tools and techniques, just about anyone can pull off creative
exploits. While an overview of many popular tools will be given, a deep-dive
will be taken into a few of the coolest and latest tools, including some in
various stages of development.
Chris is responsible for leading or conducting social engineering, internal and
external penetration testing; Windows host, network architecture, firewall and
router/switch reviews as well as enterprise security architecture and design
projects. He serves as the service line lead for the social engineering
practice, maintaining and developing the methodology as well as continuously
enhancing techniques to reflect the threat environment. Chris has over thirteen
years of information security and risk management experience.. Most recently,
Chris taught the Ultimate Hacking Foundstone course at the 2008 and 2011
Blackhat security conferences. He was also awarded second place in the Defcon 19
Social Engineering Capture The Flag (CTF) competition.
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek