Social Engineering In Practice
If I were to describe this simply it would be "A Primer on How to Con People: But made for the good guys"
I made a prior video about some useful theories that are utilized by social engineers, but it was more tools in a toolbox than a framework that can be used. So I went ahead and put something basic together that if followed can be used to create your own social engineering plan. It comes from real world examples, and will hopefully allow others to recognize social engineering attacks. It is still pretty general and focuses on information gathering rather than executing the exploit steps, but those can still be seen in many of the example videos that are included. It's good enough info to get the general idea of how it works, how quick it is, and how few barriers there are against many social engineering exploits.
Comments
Post a Comment