Stealing Credentials via Social Engineering

default-featured-image

The main objective was to compromise someone’s existing password which would provide ongoing opportunities to access all sorts of company systems in a stealth mode.

This exercise demonstrates what can be accomplished by an attacker, potentially an insider threat, in a very short period of time through non-technical means, mainly a telephone.

Meet the Team at Social-Engineer.org

default-featured-image

There has been a lot of buzz on the Net about social-engineer.org and the emails into us have been amazing.  We would like to take the time to thank all of you for your support. Quite a few of our visitors have asked aboutthe team and how we are structured. So I figured we would Continue Reading >

Social Engineering Framework Launch

default-featured-image

Just wanted to drop a note to say that www.social-engineer.org was launched today. The site is housing a complete social engineers framework as well as video’s, how-to’s and even some new tools for social engineers. One tool that was made for social-engineer.org is SET (Social Engineers Toolkit), it is an amazing tool that ties in Continue Reading >