Help Irongeek.com pay for bandwidth and research equipment:
Go With the Flow: Strategies for successful social engineering SkyDogCon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)
Go With the Flow: Strategies for successful social engineering
SkyDogCon 2012
Chris Silvers
When the ringing stops and a real life person answers the phone, it doesn’t
matter if you’re an expert at finding bugs, bypassing memory protections, or
exploiting exotic heap overflows. The few words you choose make all the
difference. This action-packed talk analyzes the key “tells” given off by
victims so that you can dynamically modify your social engineering attack to fit
many of the most common situations. Through the use of real-life recordings of
actually social engineering calls, Chris walks the audience through a typical
call scenario, analyzing successful as well as unsuccessful examples. The
participants will leave ready to begin identifying how resistant their
organization is to this growing threat.
Chris is responsible for leading or conducting social engineering, internal and
external penetration testing; Windows host, network architecture, firewall and
router/switch reviews as well as enterprise security architecture and design
projects. He serves as the service line lead for the social engineering
practice, maintaining and developing the methodology as well as continuously
enhancing techniques to reflect the threat environment. Chris has over thirteen
years of information security and risk management experience.. Most recently,
Chris taught the Ultimate Hacking Foundstone course at the 2008 and 2011
Blackhat security conferences. He was also awarded second place in the Defcon 19
Social Engineering Capture The Flag (CTF) competition.