♫musicjinni

06 - BruCON 0x0A - Social engineering for penetration testers - Sharon Conheady

video thumbnail
2009 talk overview:
In recent years, people have become more familiar with the term "social engineering", the use of deception or impersonation to gain unauthorised access to resources from computer networks to buildings. Does this mean that there are fewer successful social engineering attacks? Probably not.
In fact, because computer security is becoming more sophisticated and more difficult to break (although this is still very possible) more and more people are resorting to social engineering techniques as a means of gaining access to an organisations' resources. Logical security is at a much greater risk of being compromised if physical security is weak and security awareness is low. Performing a social engineering test on an organisation gives a good indication of the effectiveness of current physical security controls and the staff's level of security awareness. But once you have decided to perform a social engineering test, where do you start? How do you actually conduct a social engineering test?

2018 talk overview:
It’s 2018 and we can’t get enough social engineering. People are still falling for social engineering scams and criminals are using more social engineering techniques than ever. On the plus side, social engineering testers are busier than ever too. So how do you actually conduct a social engineering test in 2018? Has much changed over the past decade? Thanks to recycling, dumpster diving is a lot less disgusting, that’s for sure. Come and hear what else has changed from someone who has been delivering social engineering tests since before Brucon existed.

04 - BruCON 0x0F - Attack Surface and Security Implications of eSIM Technology - Markus Vervier

BruCON 0x09 - How hackers changed the security industry - Chris Wysopal

Simple reversing challenge and gaming the system - BruCON CTF part 1

Brucon 2010: You Spent All That Money And You Still Got Owned 1/4

08 - BruCON 0x0F - Keynote: Robot vs Robot - Mikko Hypponen

01 - BruCON 0x0A - BruCON Retro Opening

Cegeka is XL Diamond sponsor at BruCON 2023 | 10 security colleagues joined the security conference

05 - BruCON 0x0D - PIC Your Malware! - Ben Heimerdinger and Sebastian Feldmann

01 - BruCON 0x0E - BruCON Opening

BruCON Promotional Video 2015

06 - BruCON 0x0F - Red Team Tales: 7 Years of Physical Penetration Testing - Justin Wynn

04 - BruCON 0x0D - eCos Offensive Security Research Logbook - Quentin Kaiser

06 - BruCON 0x0B - Human side-channels and their implications for security and privacy

BruCON 0x07 Aftermovie

Brucon 2010: Memoirs of a Data Security Street Fighter 5/5

05-BruCON 0x0E -A Black-Box Security Evaluation of the SpaceX Starlink User Terminal-Lennert Wouters

06 - BruCON 0x0E - 0wn-premises: Bypassing Microsoft Defender for Identity - Nikhil Mittal

03 - BruCON 0x0B - Security transition from 4G to 5G are we secure enough? - Altaf Shaik and Ravisha

BruCON 0x08 – Virtual Terminals, POS Security And Becoming A... – Grigorios Fragkos

BruCON 0x07 - Brain Waves Surfing - (In)Security in EEG Technologies - Alejandro Hernandez

BruCON 0x08 - Security Through Design - Jelle Niemantsverdriet

BruCON 0x07 - Nightmares of a Pentester - Chris Nickerson

BruCON 0x09 - Open Soure Security Orchestration - Gregory Pickett

Brucon 2010: Memoirs of a Data Security Street Fighter 1/5

BruCON 0x06 - Keynote - Adam Shostack

BruCON 0x08 - What Does The Perfect Door Or Padlock Look Like? - Deviant Ollam

03 - BruCON 0x0D - Automating Binary Analysis with Ghidra's P-Code - Gergely Revay

Cédric at BruCON 2023 | 2-days Cybersecurity Conference in Mechelen

BruCON 0x08 – New Adventures In Active Defense, Offensive… - John Strand

BruCON 0x06 - Security model bedfellows - Noel Dunne & Paco Hope

Disclaimer DMCA