Nytro Posted November 6, 2011 Report Posted November 6, 2011 Social Engineering Capture the Flag Resultsdefcon@social-*engineer.orgWritten by: Christopher J. Hadnagy & James O’GormanResearchers: Dan Sharp & Eric MaxwellTableofContentsExecutiveSummary .................................................................................................................................................3PrimaryFindings..................................................................................................................................................4BackgroundandHistoryofCTFEvent .............................................................................................................5Flags................................................................................................................................................................................5ResultsandAnalysis................................................................................................................................................7CompaniesCalled.................................................................................................................................................7TargetRanking......................................................................................................................................................8Dossiers................................................................................................................................................................. 10InformationSources.....................................................................................................................10Calls......................................................................................................................................................................... 17TargetedEmployees.....................................................................................................................17PretextsUsed..................................................................................................................................17Defenses............................................................................................................................................19IndustriesTargeted .............................................................................................................................................. 22CorporateSecuritySpending....................................................................................................................... 25ConclusionandRecommendations................................................................................................................ 28AboutSocial-*?Engineer.org&Social-*?Engineer.Com................................................................................... 30Sponsors .................................................................................................................................................................... 32Download:http://www.social-engineer.com/downloads/Social-Engineer_Defcon_19_SECTF_Results_Report.pdf Quote