Social Engineering

Short description

The threats facing companies and organizations when it comes to the security of their information have changed completely in the last few decades. This has been caused on the one hand, by the complexity and natural dynamics of IT infrastructures which have turned operating a company securely into a big challenge.

But on the other hand, it has to do with sophisticated attacks that do much more than take advantage of technical loopholes. Modern attacks ever more often also make use of organizational weaknesses, including both aspects of physical security and human behavior. Instead of focusing on automated exploits, the employees are now becoming the more significant area of focus for the attacker.

Because of the variety of attacks occurring, firms are now concentrating on protecting themselves from the danger that emanates from Social Engineering (SE).

During this seminar, we will immerse ourselves in the world of Social Engineering and learn to recognize and understand its methods, tools and tricks.


The exercises will be done on www.hacking-lab.com. Following the course, the labor environment is available to the participants for 30 days more.


Learning objectives

The participants will be capable of assess a company’s level of security, judging the vulnerability of the business, and drawing up and introducing organizational as well as technical countermeasures against SE attacks.

They will learn and have at their disposal a comprehensive collection of instruments and skills which will support them while

  • assessing the company’s security level with regard to Social Engineering attacks,
  • improving security awareness in the company,
  • defending oneself and the company against social engineering attacks,
  • drafting and introducing technical and organizational countermeasures.


Highlights

Introduction

  • What is Social Engineering?
  • Current situation (trends/future)
  • Phishing
  • SMShing
  • Vishing
  • Baiting
  • Impersonation
  • Dumpster Diving
  • Elicitation/Influence/Manipulation
  • Tools (Software, Hardware)


Penetration testing methodology for social engineering 

  • Information gathering
  • Fingerprinting a company/person
  • Open Source Intelligence (Maltego/Google Dorks/Impersonation/Others)


Pretext Development

  • Modeling attacks based on collected information
  • Elicitation techniques
  • Manipulation techniques


Planning of attacks

  • Organizational precautions
  • Chronological planning based on current statistics


Reporting

  • What information is included in a good report?
  • How will this information be presented?


Awareness

  • How will the employees be sensitized to Social Engineering attacks?
  • How will an effective awareness campaign be structured?


Measures

  • Technical countermeasures
  • Organizational countermeasures 


Target group

  • CISO
  • Security Officers
  • Penetration Tester
  • Auditors
  • Persons interested in Social Engineering


Prerequisite

  • IT Security Basics
  • OSINT knowledge advantageous
  • Programming knowledge not necessary

    CALENDAR

    Beer-Talk in Bern: Bluetooth Low Energy: Protocol, Security & Attacks

    Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

    Compass Security an der ETH Kontaktparty

    Wir nehmen teil an der schweizweit grössten akademischen IT-Recruitingmesse. Komme am Samstag, 29. Februar 2020 an die ETH Zürich und besuche uns am... Read more

    Beer-Talk in St. Gallen: Bluetooth Low Energy: Protocol, Security & Attacks

    Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

    ALL DATES

    NEWS

    KMU im Visier von Cyberkriminellen

    In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

    Daten als Wettbewerbsvorteil

    Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

    Vulnerability in Apache Olingo OData 4.0

    Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

    ARCHIVES

    Compass Security Blog

    OWASP – Toronto January 2020

    A write-up of the OWASP Toronto January talk which mainly focused on the correlation and integration of results generated by automated tools in application security such as SAST, DAST and SCA.... mehr

    Interview with Jim McKay

    “I love hacking can be used for the greater good.” During the Solothurn Film Festival 2020 we had the opportunity to meet Jim McKay, who directed, among others, two episodes for Mr. Robot season one.... mehr

    ZUM BLOG