Practical Social Engineering

Anderson Tamborim is an Information Security Specialist with more than 12 years of experience in the field. He possesses huge expertise in Penetration Testing on corporate environment, developing advanced techniques to bypass security devices like IDS/IPS, firewalls, content filters and endpoint security systems (antivirus, antimalware, hids, etc.). Today Anderson works as a Security Researcher and Lead Penetration Testing at NextLayer Security Solutions.

- Introduction to Social Engineering
- Introduction to Psychological Aspects of Influence & Manipulation
- Remote Analysis: Personality Types - How detect other persons type of personality, communications model and how to create rapport with different personalities.
- Life cycle of a social engineering attack
- Digital Profiling and Targeting reduction
Finishing module I the student will be able to know the principles of social engineering, how it can interact more effectively with their target, how to create rapport and how to think like a social engineering about the engagements

- Digital Information Gathering:  Tools, Methods, and etc
- Targeting & Profiling : Tools, Methods and etc
- Cold Calling & Cold analysis
Finishing module II the student will be able to collect huge amounts of digital data about their victim, how to search valuable information using open source repositories, how to install and use these tools together and how to prepare itself to create a new SE engagement using phone calling.

- Attack Frameworks: Tools, Methods and etc
- How to develop advanced attack scenarios
Finishing module III the student will know how to install, use and obtain profit of a huge amount of tools to attack their target. I will show how to integrate many tools that come with Kali Linux and other ones. At this module the student will know how to look for online information and how to create a attack scenario.

- Surveillance: Computer & Mobile
- Collecting Digital Documents
- reserved spot for another stuff
Finishing module IV the student will know how to use the access that he obtain using social engineering to collect information. Ambient Sound recording, enabling remote webcam, copying information outside the corporate network.


How to build a PenTest Lab

In this course will you will learn how to create your own pentest lab at home. It will cover various virtualization software, Kali Linux, Nessus, Metasploit, Metasploitable, Nmap, and others. Through practical hands-on labs you will be able to not only identify systems, but also identify their vulnerabilities. All in pure practice.

Paul Janes, CISSP, GIAC – GISP, is an Information Security Analyst at Corning Incorporated with over 19 years of experience in IT Security, (DLP) Data Loss Prevention, Project Management and Server Management. Most recently, he has been involved in creating his own ethical hacking lab and enhancing his skills as an ethical hacker. Paul has a Master’s degree in Information Assurance from Capella University and an undergraduate degree from Syracuse University in Computer and Information Studies.

Partners with

Certified Cyber Forensics Professional

Latest Workshops

Popular Issues

Recent Posts

Partners with

Certified Cyber Forensics Professional
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013