Session
Elicitation - Weaponization of Social Engineering for Covert Access Operations
The presentation covers the fundamentals, methods, and practical applications of social engineering, including its definition, importance in covert access operations, and real-world examples. It delves into psychological principles, methods such as pretexting, mirroring, and active listening, and explores how to exploit human biases, curiosity, and information gaps.
The presentation also touches on countermeasures and defensive strategies, ethical considerations, and legal boundaries, highlighting the importance of recognizing elicitation attempts, using active defense, and adhering to laws and regulations governing social engineering practices.
BSIDES Lisbon 2025 [link] https://www.youtube.com/watch?v=iEQBVFVc8fA
Wild West Hackin' Fest @Deadwood 2025 [link] https://www.youtube.com/watch?v=1mWrreMAB8M
Dorota Kozlowska
Woman in Red, Penetration Tester and Social Engineering Specialist at Black Hills Information Security
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top