Break down the anatomy of a solid pretext and learn to build custom pretexts, specific to your target organization and their employees, using specific data uncovered during OSINT (Open Source Intelligence) gathering and recognizance.
In this presentation, Alethe will walk attendees through the anatomy of a pretext and failure points in pretexts. Then she will detail her technique for profiling companies and gathering information on a target company and their employees. Finally, pulling everything together, using a combination of OSINT and applied psychology, she will build pretexts and customize them based on the potential targets, their core beliefs, interests and personality types.
This talk is for those who wish to learn basic to intermediate OSINT against a business target as well as those who wish to learn about pretexts and how to create pretexts that will go undetected by targets. Aside from using the gathered OSINT to build a wireframe pretext, Alethe will discuss how to build pretexts that naturally include opportunities to build trust and rapport. As well as way to avoid breaking the vail of the pretext and raising a targets suspicion.
Outline:
Intro & Bio (5min)
Anatomy of pretext (5min)
Pretext Points of Failure (5min)
OSINT (15min)
Building a pretext using OSINT information (10min)
Wrap up and Q&A (5min)
At the end of this talk, attendees will be able to: define the anatomy of a pretext, understand how pretexts fail, conduct OSINT against a company target and its employees and use what they find to build a custom pretext for use in email phishing, voice elicitation, physical assessments or a combination of these attack vectors.
Add more value to your engagements, better prepare employers and their employees, and learn how to create pretexts that your targets are much less likely to question.