This presentation outlines a new twist on an existing social engineering attack. In the past, we have worked on getting users to plug in USB devices to drop malicious documents and executables. While this attack sometimes proves our point, it is the tip of the iceberg that can be done. Enter Social Forensication.
This is a two-pronged attack, consisting first of collecting a memory image for offsite offensive forensic analysis, the second being a rogue Wi-Fi access point attack. During this presentation, we will walk through the steps to perform each attack. Since defense is just as (if not more) important as the attack itself, we will also discuss mitigations (technical and procedural) and relevant windows detections for these attacks.
Hey guys! I know there are so many more cheats to show, but in my opinion these are the most powerful that has been ever created. I would like to hear what crazy cheats you heard of!
By the way, about the giveaway, if you don’t win an account you can still get the remaining 6 gold boxes from KasketVIP
Video#1: (I found it)