Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a captivating social engineering case study presented at GrrCON 2015, detailing how network credentials were obtained without direct solicitation. Gain insights into the techniques and strategies employed in this 25-minute conference talk, which demonstrates the power of subtle manipulation and the importance of robust security measures in protecting sensitive information.