Stealing Credentials via Social Engineering

default-featured-image

The main objective was to compromise someone’s existing password which would provide ongoing opportunities to access all sorts of company systems in a stealth mode.

This exercise demonstrates what can be accomplished by an attacker, potentially an insider threat, in a very short period of time through non-technical means, mainly a telephone.

Meet the Team at Social-Engineer.org

default-featured-image

There has been a lot of buzz on the Net about social-engineer.org and the emails into us have been amazing.  We would like to take the time to thank all of you for your support. Quite a few of our visitors have asked aboutthe team and how we are structured. So I figured we would Continue Reading >

Social Engineering Framework Launch

default-featured-image

Just wanted to drop a note to say that www.social-engineer.org was launched today. The site is housing a complete social engineers framework as well as video’s, how-to’s and even some new tools for social engineers. One tool that was made for social-engineer.org is SET (Social Engineers Toolkit), it is an amazing tool that ties in Continue Reading >

Social Engineering Contest – Defcon 2009

default-featured-image

The team here at social-engineer.org is excited to be a part of the Defcon 2009 Social Engineering Contest.  We are going to help judge as well as promote this exciting contest. DC718 and Telephreak are bringing Social Engineering back to Defcon. social-engineer.org has linked together with DC718, Telephreak, the contest/event Goons Pyr0 and Russr and Continue Reading >