Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter

Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter

Black Hat via YouTube Direct link

Black Hat Sound Bytes

21 of 21

21 of 21

Black Hat Sound Bytes

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Weaponizing Data Science for Social Engineering - Automated E2E Spear Phishing on Twitter

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A Novel Phishing Campaign Design
  3. 3 Fooling Humans for 50 Years
  4. 4 ISO: Demo Volunteers
  5. 5 Why Twitter?
  6. 6 Techniques, Tactics and Procedures
  7. 7 Design Flow
  8. 8 Triage of High Value Targets on Twitter
  9. 9 Choosing a URL shortener
  10. 10 Desirable properties of URL shortener
  11. 11 Recon and Footprinting for Profiling
  12. 12 Leveraging Markov Models
  13. 13 Training a Recurrent Neural Network
  14. 14 Tradeoffs and Caveats
  15. 15 Language and Social Network Agnosticism
  16. 16 Wild Testing SNAP R
  17. 17 Pilot Experiment
  18. 18 Man vs. Machine 2 Hour Bake Off
  19. 19 Potential Use Cases
  20. 20 Mitigations
  21. 21 Black Hat Sound Bytes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.