Loading…
BSidesLV 2015 has ended
Back To Schedule
Wednesday, August 5 • 11:00 - 11:25
Phishing: Going from Recon to Credentials

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

This presentation will quickly explore some of the common phishing attack tools and techniques. Additionally, there will be a demo of a new tool which can assist penetration testers in quickly deploying phishing exercises in minimal time. The tool can automatically search for potential targets, deploy multiple phishing websites, craft/send phishing emails, record the results, and generate a basic report.

Speakers
avatar for Adam Compton

Adam Compton

Principal Security Consultant, TrustedSec
Adam Compton has been a programmer, researcher, professional pentester, father, husband, and farmer.  Adam has around 2 decades of programming, network security, incident response, security assessment, and penetration testing experience. Throughout Adam\'s career, he has worked for... Read More →
EG

Eric Gershman

Eric Gershman is currently working on the security team for a group that manages large systems that enable researchers to do "Big Science". Prior to working in security Eric pursued a bachelors degree in Information Technology at the University of Central Florida. During his time... Read More →


Wednesday August 5, 2015 11:00 - 11:25 PDT
Proving Ground Florentine E

Attendees (0)