Pwning People Personally
Offered By: YouTube
Course Description
Overview
Explore advanced social engineering techniques in this 45-minute conference talk from Derbycon 2015. Delve into the world of personal pwning, covering topics such as creeper status, encounter optimization, and phishing strategies. Learn from real-world examples, including both successes and failures, and discover alternative methods when PowerShell is unavailable. Gain insights into clipboard monitoring, screen capturing, audio recording, and cookie stealing. Understand the power of cookies in successful attacks and engage in a Q&A session to further expand your knowledge of social engineering tactics.
Syllabus
Intro
FIRST STEP OF PWNING
CREEPER STATUS
CREEPER NO CREEPIN
ENCOUNTER OPHISHAL PPL
A REAL EXAMPLE...
FAIL!?!
SOMETHING MAGICAL HAPPENED
AND OF COURSE SEND...
HANGOUTS
DOES IT WORK?
ANOTHER REAL EXAMPLE (WHEN THINGS GO WRONG)
WHAT IF NO POWERSHELL?
CLIPBOARD MONITORING
SCREEN SHOTTING
RECORDING AUDIO
RECORDING VIDEO?
COOKIE STEALING
COOKIES = WIN
QUESTIONS?
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX