Explore a comprehensive conference talk on phishing techniques, covering the entire process from reconnaissance to credential harvesting. Delve into expert insights from Adam Compton and Eric Gershman as they discuss advanced strategies and methodologies used in phishing attacks. Gain valuable knowledge on how attackers gather information, craft convincing phishing campaigns, and ultimately obtain credentials. Learn about the latest trends and tactics employed by cybercriminals, and discover effective countermeasures to protect against these threats. This informative session, presented at Derbycon 2015, offers essential information for cybersecurity professionals, IT administrators, and anyone interested in understanding and mitigating phishing risks.
Overview
Syllabus
Break Me07 Phishing Groing from Recon to Creds Adam Compton Eric Gershman