The Social Engineering
186 views | +0 today
Follow
The Social Engineering
Social Engineering tools techniques
Your new post is loading...
Your new post is loading...
Scooped by Gerasimos Kassaras
Scoop.it!

Nimble spammers exploit Boston bombings, Texas disaster

Nimble spammers exploit Boston bombings, Texas disaster | The Social Engineering | Scoop.it
Junk mail gang spreading botware by tapping interest in American calamities
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

The Odd Couple: Metasploit and Antivirus Solutions

The Odd Couple: Metasploit and Antivirus Solutions | The Social Engineering | Scoop.it
I hear a lot of questions concerning antivirus evasion with Metasploit, so I’d like to share some the information critical to understanding this problem.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

How Can I Protect Against Phishing? - Whiteboard Wednesdays

How Can I Protect Against Phishing? - Whiteboard Wednesdays | The Social Engineering | Scoop.it
Phishing is on the rise as an attack vector because it's often the fastest and easiest way to penetrate a network's defenses. You're doing security awareness training, but how do your users behave when faced with a real phishing 
e-mail?
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Free Stanford ‘Intro to Cryptography’ Class Review

Free Stanford ‘Intro to Cryptography’ Class Review | The Social Engineering | Scoop.it
Last Spring I took my first coursera class, Introduction to Cryptogaphy taught by Dan Boneh. In college I took a few crypto classes, and I also deal with some crypto problems at work and in CTF.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Dropbox going two-factor, becoming de facto

Dropbox going two-factor, becoming de facto | The Social Engineering | Scoop.it
Move comes four weeks after the popular online file sharing service was hit by an embarrassing spam attack...
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Weekly Metasploit Update: OpenVAS, SAP, NetIQ, and More!

Now that I've consumed a significant percentage of my own weight in turkey (seriously, it was something like five percent), it's time to shake off the tryptophan and get this week's update out the door. Attacking Security Infrastructure:...
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

AV Evading Meterpreter Shell from a .NET Service

AV Evading Meterpreter Shell from a .NET Service | The Social Engineering | Scoop.it
Quite a few successful attacks rely on creating a malicious service at some point in the attack chain. This can be very useful for a couple reasons.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

CVE-2012-5357,CVE-1012-5358 Cool Ektron XSLT RCE Bugs

CVE-2012-5357,CVE-1012-5358 Cool Ektron XSLT RCE Bugs | The Social Engineering | Scoop.it
In early 2011, I met a fully updated 8.02SP2 Ektron and it was a bunch of bugs at first sight. Ektron is a CMS. It isn’t a household name like wordpress, but it’s actually used on quite a few very big enterprise-like sites.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Re: Pause smb_login?

Re: Pause smb_login? | The Social Engineering | Scoop.it
Posted by rat mamba on Dec 05To use ctrl+z would kill the session and if u want to pause it in my opinion just leave it alone.It would not work.Even the smb module of bktrk 5 r3 has some problems.So try chekin out and inform me too...
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Metasploit Hits 1000 Exploits

Metasploit Hits 1000 Exploits | The Social Engineering | Scoop.it
Along with today's 4.5 release, Metasploit hit a thousand exploits.So, what does that mean?
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Social engineering in penetration tests: 6 tips for ethical (and legal) use

Social engineering in penetration tests: 6 tips for ethical (and legal) use | The Social Engineering | Scoop.it
Social engineering techniques are often crucial to executing penetration tests. But which methods cross the ethical line - or even venture into the dangerous territory of illegal?
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Introduction to Metasploit Hooks

Metasploit provides many ways to simplify your life as a module developer. One of the less well-known of these is the presence of various hooks you can use for processing things at important stages of the module's lifetime.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Social Engineering: The Basics

Social Engineering: The Basics | The Social Engineering | Scoop.it
What is social engineering? What are the most common and current tactics? A guide on how to stop social engineering.
Gerasimos Kassaras's insight:

awsome....

more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Clickjacking Google

Clickjacking Google | The Social Engineering | Scoop.it
When testing some x-frame-options behavior, I noticed that sameorigin cares about the top location, but not the parent location.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Blue Coat takes malware hunt to the node

Blue Coat takes malware hunt to the node | The Social Engineering | Scoop.it
Tracking infrastructure of malnets gives the security industry 'the big picture,' says company researcher...
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Exploit Trends: Top 10 Searches for Metasploit Modules in October

Exploit Trends: Top 10 Searches for Metasploit Modules in October | The Social Engineering | Scoop.it
Time for your monthly dose of Metasploit exploit trends! Each month we gather this list of the most searched exploit and auxiliary modules from the Metasploit database.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Dan Guido’s Favorite Food? (A script to search reddit comments)

Dan Guido’s Favorite Food? (A script to search reddit comments) | The Social Engineering | Scoop.it
CSAW CTF was fun. My team (ACMEPharm) solved all the challenges but network 400, which was a dumb challenge anyway :P
One of the other challenges we struggled with was a recon one: “what is Dan Guido’s favorite food”?
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

Extracting Certificate Info from Things (like web services)

Extracting Certificate Info from Things (like web services) | The Social Engineering | Scoop.it
Disclaimer: short post today due to holiday. There’s no research here, but this is something I recently used which might be useful to others
Certificates these days are thrown around on everything.
more...
No comment yet.
Scooped by Gerasimos Kassaras
Scoop.it!

11 tips to stop spear-phishing

11 tips to stop spear-phishing | The Social Engineering | Scoop.it
From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, Jason Clark, Chief Security and Strategy Officer with Websense, shares tips for handling spear-phishing threats...
more...
No comment yet.