Session

Elicitation - Weaponization of Social Engineering for Covert Access Operations

The presentation covers the fundamentals, methods, and practical applications of social engineering, including its definition, importance in covert access operations, and real-world examples. It delves into psychological principles, methods such as pretexting, mirroring, and active listening, and explores how to exploit human biases, curiosity, and information gaps.
The presentation also touches on countermeasures and defensive strategies, ethical considerations, and legal boundaries, highlighting the importance of recognizing elicitation attempts, using active defense, and adhering to laws and regulations governing social engineering practices.

BSIDES Lisbon 2025 [link] https://www.youtube.com/watch?v=iEQBVFVc8fA
Wild West Hackin' Fest @Deadwood 2025 [link] https://www.youtube.com/watch?v=1mWrreMAB8M

Dorota Kozlowska

Woman in Red, Penetration Tester and Social Engineering Specialist at Black Hills Information Security

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top