BODY LANGUAGE BEHIND
SOCIAL ENGINEERING ATTACKS

Sarka Pekarova, Dreamlab Technologies

Social Engineering has many different faces from using open source intelligence (OSINT), phishing, vishing, smishing and all the other '-ishings', dropping weaponized USB flash drives to eventually getting right in the middle of your target's own office! As there are many tools and described ways of all the -ishings and almost all of them do not require any interaction with target because it does not require to leave your warm chair in front of your machine at home. If you are interested in how I break into buildings like a pirate queen, I will explain how to interact with our target directly and that requires a certain knowledge of techniques and skills.


I will describe social engineering attack techniques using knowledge of body language and face micro-expressions behind influence and persuasion and how to manipulate targets into believing my pretext and comply with my (evil) plans. I will step over to the defensive side as well and explain how to defend against the attack techniques I use.

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :