Stealing Credentials via Social Engineering


The main objective was to compromise someone’s existing password which would provide ongoing opportunities to access all sorts of company systems in a stealth mode.

This exercise demonstrates what can be accomplished by an attacker, potentially an insider threat, in a very short period of time through non-technical means, mainly a telephone.

Meet the Team at


There has been a lot of buzz on the Net about and the emails into us have been amazing.  We would like to take the time to thank all of you for your support. Quite a few of our visitors have asked aboutthe team and how we are structured. So I figured we would Continue Reading >

Social Engineering Framework Launch


Just wanted to drop a note to say that was launched today. The site is housing a complete social engineers framework as well as video’s, how-to’s and even some new tools for social engineers. One tool that was made for is SET (Social Engineers Toolkit), it is an amazing tool that ties in Continue Reading >