top of page
  • Writer's pictureInfosec In the City (IIC)

Body Language Behind Social Engineering Attacks — by Sarka Pekarova

#IICSG2019 Conference Insights Track

Day 1 (19 Jun 2019)


@ Breakout Room 2


Social Engineering has many different faces from using open-source intelligence (OSINT), phishing, vishing, smishing and all the other '-ishings', dropping weaponized USB flash drives to eventually getting right in the middle of your target's own office! As there are many tools and described ways of all the -ishings and almost all of them do not require any interaction with target because it does not require to leave your warm chair in front of your machine at home. If you are interested in how I break into buildings like a pirate queen, I will explain how to interact with our target directly and that requires a certain knowledge of techniques and skills.

I will describe social engineering attack techniques using knowledge of body language and face micro-expressions behind influence and persuasion and how to manipulate targets into believing my pretext and comply with my (evil) plans. I will step over to the defensive side as well and explain how to defend against the attack techniques I use.

18 views0 comments


Post: Blog2_Post
bottom of page