Once flagged by the FBI and the US banking industry as a potential national security threat, the Social Engineering Village (SEVillage) presents this unprecedented experience, The Human Hacking Conference, now considered a cornerstone educational event in the security industry and sought-out by America’s top corporations and law enforcement agencies. Founded 10 years ago by renowned “human hacking” expert, author, […]
Content tagged: information gathering
There are a variety of technical methods for information gathering. Some methods require high-tech equipment and in other situations low-tech options will work. No one source of information is the leading method to use, nor is one method alone likely to give you enough data for the compromise. When preparing for a penetration test utilize […]
There are a variety of physical methods for information gathering. Some require very little equipment and others require high-tech gear. The one thing these methods have in common is that they can not be done from a remote location. You have to be on-site and in-person. This means that pretexting, the principles of influence, and […]
What damage does social engineering cause? To give you an idea, we’ve put together a list of some of the hacks in 2014 made possible by use of social tactics like phishing, vishing, and impersonation.
Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most successful methods of gaining information needed to breach an organization, even when used by an inexperienced attacker. We’ll go over five points for successful vishing.
In This Issue: “Information Gathering and the Social Engineer.” If you wanna look cool and sexy, thorough research and preparation is necessary before any engagement. Michele Fincher explores how social media is being used to gather information.
It seems like you can’t turn on the news right now and see the story about the celeb’s getting hacked. Chris was even asked to speak about it with Fox Business Network. There are a lot of sensational reports about how this “hack” occurred, but lets just sit and think for a minute. In the […]
In This Issue: “After Action Report: Anatomy of a Social Engineering Engagement and Picking Up the Pieces.” A lot of folks ask us about our SE engagements. This action report provides a quick overview of what we recently accomplished and what can be done to mitigate the social engineering threat.