Social engineering the dark art. social engineering defined beyond the dictionary.

Slides:



Advertisements
Similar presentations
WHAT ON EARTH AM I HERE FOR? What, what, what, what on Earth am I here for? Why, why, why, why on earth am I here? How, how, how, how can I find the answer?
Advertisements

Animals Are Really People In Disguise... What part of quiet didn’t you understand??
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
The Art of Social Hacking
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Aleksandra Kurbatova IVCM.  What is social engineering?  Types  Pretexting  …  Summary  Conclusion.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
Cardboard Box IV: Christmas. I can’t wait for Christmas!
 First to use the blog builder I used you need a need a Google account. If you do not have one go to: 
 First for the blog site we are going to use you will need a Google account. If you do not have one go to: 
Copyright © 2011, 2007, 2004 by Saunders, an imprint of Elsevier Inc. All rights reserved. 1 Medical Practice Marketing and Customer Service Chapter 26.
Investing 101 – Part 3 Spotting Frauds and Scams.
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
SEARCH ENGINE OPTIMIZATION How You can generate qualified Leads from Search Engine Optimization Search Engine Optimization.
Media Arts II Sorry guys, but I feel like death….however, you have a deadline TODAY.
Footprinting & Intelligence Gathering Paterva & Beyond Wardell Motley, C|EH, NSA IAM\IEM BSides – Dallas Ft. Worth – 2010
Welcome to Century Library Also known as the ISC Instructional Support Center.
WOULD YOU LIKE TO KNOW A GIRL PERSONALLY? 1 Someone loves you and offers a wonderful date for your life. HER PERSPECTIVE “The LORD God said, ‘It is not.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Introducing the networks and the Internet By Cody Gibbs.
Plagiarism Slam Prove your knowledge!. Question #1 If I find information I want to use in a book or on the internet, I can put the information in my own.
Goal: You will know history, theory and implementation strategies for these 3 main roles that robotics and related technologies play in educational settings.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Welcome to Business Communications!. My Name is Y. Michelle Brown A little bit about me… The Y is for Yvette, but I don’t use my first name. I prefer.
Let Everything That Has Breath
List Eruption 2.0 Review List Eruption Review – Overview Product Name : List Eruption 2.0 Author : Mark Thompson Product niche : List Building Official.
Designing a Simple but Modern Website in this easy Photoshop tutorial By Joel Jurado.
Advanced Persistent Threats (APT) Sasha Browning.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
CompTIA A+ Exam Preparation Course in a Book for Passing the CompTIA A+ Certified Exam - The How To Pass on Your First Try Certification Study Guide 1.
Intro to Computer-Assisted Reporting. Why I’m here In a few short lessons, I will try and show you all the possibilities of the Internet and the wealth.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
CUSTOMER SERVICE 101. what is CUSTOMER SERVICE? providing a quality product or service that satisfies the needs/wants of a customer and keeps them coming.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Security Awareness Program. Agenda  What is Information Security?  Why is Information Security important?  Education Data Breach  Appropriate.
Creating your online identity
Social Engineering: The Human Element of Computer Security
GENI, Pen Testing, & other stories
Cyber Warfare and Importance of Cyber Awareness
The Art of Social Engineering
Social Engineering Charniece Craven COSC 316.
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
Report Phishing Forward phishing s to
In a Library, I Media is a huge part of my life.
How To Find ? The Right Fencing Contractor. Search it on the internet.. Are you searching in Google with your search term? Usually search engines bring.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Spear Phishing Ways to Minimize its Risks
The Art of Deception.
Strong Security for Your Weak Link:
People: The Social Engineer’s Dream
Introduction to Computers
Internet Safety Objectives:
Report Phishing Forward phishing s to
Animals Are Really People In Disguise
If I’d only known then what I know now about phishing…
Instructions To Play the Cybersecurity Magic 8-Ball game, go to the “Slide Show” menu and select the “From Beginning” icon. Once the game launches, click.
Animals Are Really People In Disguise
“There is a sucker born every minute”
Microsoft Ignite /18/2019 7:21 AM
the title of the presentation to go here
Animals Are Really People In Disguise
Engine Part ID Part 1.
Engine Part ID Part 2.
Engine Part ID Part 2.
Recon DSU GenCyber.
Presentation transcript:

social engineering the dark art

social engineering defined beyond the dictionary

social engineering defined beyond the dictionary

social engineering defined beyond the dictionary

social engineering defined beyond the dictionary

methodology lather, rinse, repeat dev executeanalysis recon

methodology lather, rinse, repeat dev executeanalysis recon

reconnaissance dial for dollars interactive recon reach out and fist someone

reconnaissance executive vainglory

reconnaissance tom is your fiend site:linkedin.com -dir inurl:pub “company" site:facebook.com “company" site:facebook.com “person" site:monstercom “company" weakest link in the chain monster bait

reconnaissance I am from the government and I’m here to help

reconnaissance with vendors like these…

reconnaissance my other google is maltego

the art of disguise incognito is not a ludacris album

janitors maintenance people delivery personnel contractor the invisible man the art of disguise

all for one and one for fail it guy corporate lackey “new guy”

the art of disguise props and toys that don’t ship in a brown wrapper computer gear id badge work order clipboard portable media

the art of disguise pretext calling spear phishing social networks on the internet nobody knows you’re a god

the art of disguise caller id rfid sufficiently advanced technology is indistinguishable from magic

appeal to authority getting what you want sycophants make great minions

appeal to authority plea for help getting what you want cute puppy-dog eyes

appeal to authority plea for help offer of help getting what you want white knight security

appeal to authority plea for help offer of help developing rapport getting what you want friends don’t let friends get social engineered

appeal to authority plea for help offer of help developing rapport name dropping getting what you want let someone else create the sycophant for you

appeal to authority plea for help offer of help developing rapport name dropping getting what you want where there’s a will there’s a way

typical scenario what does an attack look like? corporate headquarters, this is judy avalon. how may i direct your call.

typical scenario what does an attack look like?

Typical Scenario What Does an Attack Look Like?

Typical Scenario What Does an Attack Look Like?

typical scenario what does an attack look like?

typical scenario what does an attack look like?

typical scenario what does an attack look like?

typical scenario what does an attack look like?

typical scenario what does an attack look like?

tha art of storytellin’ your turn