Overview
Explore social engineering techniques and protective measures in this 47-minute conference talk from NDC Conferences. Delve into the world of manipulation tactics used by attackers to exploit human vulnerabilities and gain unauthorized access to critical systems. Learn about pre-texting, elicitation, and body language as tools for deception. Examine real-world examples from notorious figures like Kevin Mitnick, Frank Abagnale, and Charles Ponzi. Discover common attacks, information gathering methods, and questioning techniques used by social engineers. Understand manipulation strategies involving fear, guilt, and the "foot in the door" technique. Gain valuable insights into personal and corporate mitigation techniques to safeguard against social engineering threats.
Syllabus
Intro
Disclaimer
3 Methodologies
Statistics : Phishing
Statistics : Impersonation
Types of Social Engineer
Why Social Engineering?
Common Attacks
Kevin Mitnick
Frank Abagnale
Charles Ponzi
Social Engineering Techniques
Information Gathering
Questioning Techniques
Funneling
Pretexting vs Elicitation
Manipulation - Fear
Manipulation - Guilt
Manipulation - Foot in the Door
Personal Mitigation Techniques
Corporate Mitigation Techniques
Taught by
NDC Conferences