I recently returned from the new Social Engineering training provided by Social-Engineer.org in the beautiful city of Seattle,WA, a state known for sparkly vampires, music and coffee shop culture. As many of you reading this article, i also read the authors definitive book Social Engineering- The art of human hacking and routinely perform SE engagements for my clients. When i heard that the author of the aforementioned book was providing training i immediately signed up to get an in person glance at the content provided in the book. However, i was pleasantly surprised to find the course covered so much more then what was presented in the book.
Instructors:
- Chris Hadnagy the author of the book Social Engineering- The art of human hacking.
- Robin Dreeke the author of the book It's not all about me.
I wasn't aware that there would be more then one instructor and was extremely happy with the content provided by both instructors. Chris and Robin both have a vast amount of knowledge and experience in the realm of social engineering. Each instructor brought a different angle and use case scenario to the course content. Robin is an FBI agent in charge of behavioral analysis and uses social engineering in his daily life and work to get the results needed to keep our country safe. Chris uses social engineering in his daily work to help keep his clients secure and provides all sorts of free learning material to the information security community through podcasts and online frameworks.
Course Material and Expectation:
I originally thought that the material covered in class would be a live reiteration of the material covered in Chris's book. However, I couldn't have been more wrong !! The whole first day was about reading yourself and other people, much of the material was what Robin uses to train FBI agents in eliciting information from possible terrorist threats. Each learning module was based on live demo's, nightly labs, and constant classroom interaction. Each module was in depth and the level of interaction between students was extremely useful and friendly. I would say the instructors had as much fun as the students learning and sharing social techniques and war stories.
The class was heavily made up of ways to elicit personal and confidential information in a way that left the individuatial "Happier for having met you". Using language, body posture and social truisms as your weapon to gather information, not intended for your ears, but happily leaving the tongue of your target.
Other class activities and materials included an in depth look at micro expressions with labs and free extended learning material going beyond the allotted classroom days. Also break out sessions which focused on creating Phone and Phishing scripts to effectively raise your rate of success. These sessions were invaluable at learning to use proper language techniques on the phone and in email to obtain your objectives.
Nightly Missions/Labs:
If you think that you are going to relax at night with a beer. Think again!! You must ensure that your nights are free, as you will be going on missions to gain information from live targets at venues of your choice. Each night you will have a partner and a mission to gain certain information while making that persons day better then it started. The information you are requested to obtain will change each night and if done properly you will notice all of the material in class starting to unfold.. When you get to body language training you will notice which targets are open and when its best to go in for the kill. You will see interactions change based on a persons change in posture and facial expressions. Each day you will take the new techniques you have learned and put them into practice. Each morning you have to report your findings to the class..
During my nightly labs i obtained information such as door codes to secured research facilities, information regarding secret yet to be released projects. On the lighter side of things i obtained much personal information from my targets along with phone numbers and invitations for further hangouts and events. I made many new friends inside and outside of class.
There were also labs within the confines of the classroom such as games used to solidify your knowledge and tests to figure out what kind of learner you are. Technical labs on the use of information gathering tools and ways to use phone and phishing techniques to your advantage via linguistically and technologically. Essentially the class was about 60% interaction and labs.
Proof it works:
After class i immediately had a phishing and phone based contract at my current employment. I used the email and phone scripts that we created in class with 100% click rate and 100% success in phone elicitation techniques. Gaining full unfettered access to networks through phone and email elicitation and interaction. Although I do generally have a decent SE success rate, my rates on return are now much higher and an understanding of what works and what doesn't, and why are much more refined.
Conclusion and Certification:
I paid for this class out of pocket, including all expenses, hotels, rentals cars and planes etc etc. I would say that the class was worth every penny in which i paid for it. Many extras were given including black hat passes, extended training from notable sources and continued interaction from instructors after class ended. I would highly recommend this class to anyone looking for a solid foundation in social engineering or a non technical alternative to training. You will learn a lot, push yourself in new ways and have a blast doing it. However I did not see any sparkly vampires while in seattle.... Twilight lied to me LOL
The certification is a 48 hour test in which you will utilize your knowledge gained technologically and socially to breach a company.I am not going to give away to much information about the certification as i haven't taken it yet and I do not want to misspeak on the subject. However I will say that social-engineer.org has done an excellent job at figuring out a way to include Real World Social Engineering into a test with verifiable proof of results. I am going to take my test in a couple weeks and it should be a blast!!!
Thanks and I hope this review is helpful to all those looking for SE training. I had a blast :) :)Related news
- Hacking Tools For Games
- Pentest Tools Website Vulnerability
- Usb Pentest Tools
- Hacking Tools Hardware
- Pentest Tools For Mac
- Pentest Tools Github
- Pentest Tools Framework
- Pentest Tools Linux
- Hacker
- Computer Hacker
- Hacking App
- Hacking Tools For Mac
- Blackhat Hacker Tools
- Hack Tools For Windows
- Beginner Hacker Tools
- Pentest Tools Online
- Hack Tools For Mac
- Nsa Hack Tools
- Best Hacking Tools 2019
- Android Hack Tools Github
- Termux Hacking Tools 2019
- Pentest Tools For Ubuntu
- Easy Hack Tools
- Beginner Hacker Tools
- Hacking Tools 2019
- Hack Tools Github
- Pentest Tools Apk
- Hacker Tool Kit
- Black Hat Hacker Tools
- Hack Tools For Pc
- Pentest Automation Tools
- Hack Tools Pc
- Best Hacking Tools 2019
- Pentest Tools Framework
- How To Make Hacking Tools
- Pentest Tools List
- Hack And Tools
- Hacking Tools Download
- Hacking Tools For Windows
- Growth Hacker Tools
- Github Hacking Tools
- Pentest Tools Download
- Pentest Tools Download
- Pentest Tools Url Fuzzer
- Hack Apps
- Pentest Tools Download
- Hacker Tools
- Hacking Tools For Mac
- Underground Hacker Sites
- Pentest Tools Port Scanner
- Hack Tools 2019
- Hacking Tools 2019
- Growth Hacker Tools
- Hacking Tools And Software
- Nsa Hack Tools
- Hack Tools For Pc
- Hacking Tools For Games
- Hack And Tools
- Hacker Tools Github
- How To Make Hacking Tools
- Hacker Tools For Mac
- Kik Hack Tools
- Hack Tools For Ubuntu
- Hacking Tools For Pc
- Android Hack Tools Github
- Best Pentesting Tools 2018
- Nsa Hack Tools Download
- Hacker Tools Apk Download
- Usb Pentest Tools
- Tools For Hacker
- Best Hacking Tools 2020
- Hacking Tools And Software
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Kali Linux
- Hacker Tools For Pc
- Hack App
- Pentest Tools For Ubuntu
- Nsa Hack Tools Download
- Hack Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacking Tools Pc
- Hack Tool Apk
- Pentest Tools Windows
- Github Hacking Tools
- Github Hacking Tools
- Hack Tool Apk No Root
- Hacker Tools List
- Pentest Tools Nmap
- Hacking Tools Download
- Hack Tools Download
- Nsa Hack Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Github
- Hacker
- Hacking Tools
- Easy Hack Tools
- Hacker Tools Apk
- Game Hacking
- New Hack Tools
- Pentest Tools For Android
- Github Hacking Tools
- Pentest Tools Github
- Hack Tools Mac
- Hacking Tools Mac
- Pentest Recon Tools
- Pentest Tools Find Subdomains
- Hacking Tools Usb
- Hack Tool Apk No Root
- Hack Tools
- Hack Tools 2019
- Pentest Tools Linux
- Hack Tools
- Hacker Search Tools
- Hacking Tools
- Nsa Hacker Tools
- Pentest Tools Url Fuzzer
- Hack Website Online Tool
- Hacker Tools For Pc
- Hack Tools 2019
- Hack Tools Mac
- Hacker Tools Mac
- Hacking Tools 2019
- Hack Tools Pc
- How To Hack
- Hacking Tools
- Pentest Tools For Mac
- Pentest Tools Kali Linux
- Pentest Tools For Mac
- Pentest Box Tools Download
- Underground Hacker Sites
- Pentest Tools Free
- Hacking App
- Hacking Tools Free Download
- Hacker Tools List
- Hacker Tools 2020
- Hacker Hardware Tools
- Hacker Tools
- Github Hacking Tools
- Hacking Tools Software
- Pentest Tools Website Vulnerability
- Pentest Tools Port Scanner
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Games
- Pentest Tools
- Hacking Apps
- World No 1 Hacker Software
- Game Hacking
- Pentest Tools Review
- Tools For Hacker
- Hacker Tools 2020
- Tools For Hacker
- Computer Hacker
- Hacking Tools Hardware
- Hacking Tools For Windows
- Hack Rom Tools
- Blackhat Hacker Tools
- Pentest Tools Apk
- Hack Tool Apk No Root
- Tools 4 Hack
- Physical Pentest Tools
No comments:
Post a Comment
Note: only a member of this blog may post a comment.