Jump to content
Nytro

Social Engineering Capture the Flag Results (Defcon 19)

Recommended Posts

Posted

Social Engineering Capture the Flag Results

defcon@social-*engineer.org

Written by: Christopher J. Hadnagy & James O’Gorman

Researchers: Dan Sharp & Eric Maxwell

Table
of
Contents
Executive
Summary .................................................................................................................................................3
Primary
Findings..................................................................................................................................................4
Background
and
History
of
CTF
Event .............................................................................................................5
Flags................................................................................................................................................................................5
Results
and
Analysis................................................................................................................................................7
Companies
Called.................................................................................................................................................7
Target
Ranking......................................................................................................................................................8
Dossiers................................................................................................................................................................. 10
Information
Sources.....................................................................................................................10
Calls......................................................................................................................................................................... 17
Targeted
Employees.....................................................................................................................17
Pretexts
Used..................................................................................................................................17
Defenses............................................................................................................................................19
Industries
Targeted .............................................................................................................................................. 22
Corporate
Security
Spending....................................................................................................................... 25
Conclusion
and
Recommendations................................................................................................................ 28
About
Social-*?Engineer.org&
Social-*?Engineer.Com................................................................................... 30
Sponsors .................................................................................................................................................................... 32

Download:

http://www.social-engineer.com/downloads/Social-Engineer_Defcon_19_SECTF_Results_Report.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...