Presented at
CarolinaCon 12 (2016),
March 5, 2016, 3 p.m.
(Unknown duration).
Criminals use Vishing to trick victims in order to commit fraud or for other nefarious purposes. In this presentation we'll will cover a bit of background, the current state of Vishing attacks along with how fraudsters use these tactics for their benefit.
Vishing is often overlooked vector and as a result of CarolinaCon 2016, I wrote PhreakMe; an open source tool that lowers the bar for security professionals to add the Vishing vector to their toolkit. Using this I'll demonstrate how penetration testers can use open source software to utilize vishing tactics in their tests and how organizations can use this to their benefit.
There is only one phishing vendor I am aware of that claims to provide "vishing" services, and PhreakMe is a little different. Mainly because it is OSS and can be adapted and developed depending on the communities needs.
Presenters:
-
Owen / Snide
as Owen / Snide- @LinuxBlog
Owen started his career as a developer and has worked in other areas including server administration, DevOps, Application Security and most recently penetration testing and red teaming. He has over 10 years of experience with security in some form or another. He grew up in a small coastal town in the UK and moved to the states in his teens. He enjoys building, breaking things and geeking out.
Links:
Similar Presentations: