Social Engineering Resources

Social Engineering

Latest Social Engineering Resources

Never Stop Frontin’: Redirector and Proxy Setup Made Easy
Sep 09, 2021 Nicholas Anastasi

Never Stop Frontin’: Redirector and Proxy Setup Made Easy

Protecting your infrastructure from prying eyes is an important part of landing a phish and maintaining access to a client’s network. The process of setting up redirectors and reverse proxies has traditionally been difficult and hard to automate across different cloud platforms. Today, we’re going to solve that problem with our new repository, sneaky_proxy, which will allow you to automate your...
Never had a bad day phishing. How to set up GoPhish to evade security controls.
Jun 30, 2021 Nicholas Anastasi

Never had a bad day phishing. How to set up GoPhish to evade security controls.

I’m going to quickly go through the process of setting up GoPhish and show you how we evade defenders to increase the success rate of our phishing campaigns.
Leveraging hijacked Slack sessions on macOS
Jan 07, 2021 Nicholas Anastasi

Leveraging hijacked Slack sessions on macOS

We are going to dig into Slack workspace compromise to provide additional information and tooling you can use to leverage access. This guidance will build off of “Abusing Slack for Offensive Operations”, a great article Cody Thomas wrote for the SpectrOps blog.
Pro tips for purchasing and aging phishing domains
Nov 12, 2020 Nicholas Anastasi

Pro tips for purchasing and aging phishing domains

Good command-and-control infrastructure requires a known, trusted domain. When you’re first starting out, this can be difficult to find, but luckily other testers have provided many great resources.
Preventing Social Engineering Breaches
Oct 05, 2020 Casey Cammilleri

Preventing Social Engineering Breaches

It’s pretty common for companies to bundle social engineering into their penetration testing programs. But when the report shows up, you may find you’re surprised and frustrated at the rate of employees clicking links to open malicious documents. How were my employees so easily manipulated? And why didn’t anyone on the IT staff catch this? Don’t sweat it. Happens to...
3 Phishing Streams to Watch and Safeguard
Aug 05, 2020 Nicholas Anastasi

3 Phishing Streams to Watch and Safeguard

There are cybersecurity phishing streams & threats constantly growing and evolving. Email spam is no longer the front line of the battlefield. Here are 3 new phishing streams beyond email - and how to safeguard them.
« 1 2