We are inviting those of you who think you can use ethical social engineering skills to stretch your limits as a social engineer. A unique blend of information gathering, planning and attack vector execution will challenge the very core of every participant.
Even armed with this knowledge there are some things we must be aware of to avoid falling prey to a scam that can lead to identity theft. It is not private knowledge that 100 million surveys are being sent this week. You know it, I know it and all malicious scammers and social engineers know it too. Be aware of these attacks
The main objective was to compromise someone’s existing password which would provide ongoing opportunities to access all sorts of company systems in a stealth mode.
This exercise demonstrates what can be accomplished by an attacker, potentially an insider threat, in a very short period of time through non-technical means, mainly a telephone.
There has been a lot of buzz on the Net about social-engineer.org and the emails into us have been amazing. We would like to take the time to thank all of you for your support. Quite a few of our visitors have asked aboutthe team and how we are structured. So I figured we would Continue Reading >