Tuesday 4th June, 2013
11:55am to 12:40pm
When the ringing stops and a real live person answers the phone, it doesn’t matter if you’re an expert at finding bugs, bypassing memory protections, or exploiting exotic heap overflows. The few words you choose make all the difference. This action-packed talk analyzes the key “tells” given off by victims so that you can dynamically modify your social engineering attack to fit many of the most common situations. Through the use of real-life recordings of actually social engineering calls, Chris walks the audience through a typical call scenario, analyzing successful as well as unsuccessful examples. The participants will leave ready to begin identifying how resistant their organization is to this growing threat.
Sign in to add slides, notes or videos to this session