Networking-Forums.com

Professional Discussions => Security => Topic started by: deanwebb on March 08, 2016, 12:27:50 PM

Title: Social Engineering Video
Post by: deanwebb on March 08, 2016, 12:27:50 PM
I'm at 0:33  :awesome:

https://www.youtube.com/watch?v=_tXrr-SQn2k

And, yes, there were people giving directions on how to break into their own networks to a guy with a video camera.

:facepalm2:
Title: Re: Social Engineering Video
Post by: Nerm on March 08, 2016, 01:00:10 PM
You can neither confirm nor deny? What are you, the NSA media spokesperson lol.
Title: Re: Social Engineering Video
Post by: deanwebb on March 08, 2016, 02:25:34 PM
Edited out was my bit about requiring all hackers to submit a request in the form of an IT-344/a form, "Request for Unauthorized Access." We then process the request and schedule a time for the hacker to breach the network. We have lots of attackers, so we try our best to accommodate all their needs. If the IT-344/a form is incomplete or in error, we send it back and temporarily deny the request.