The Schmooze Strikes Back : BackTrack Linux – Penetration Testing Distribution

The Schmooze Strikes Back

se ctf
Social Engineering Defcon 19 CTF is on its way.

When all you have is a hammer, every problem looks like a nail. This is a common mistake that a lot of technical security practitioners make when dealing with security issues – always focusing on technology. This is why the BackTrack Team has always been so pleased to support the existence of Social-Engineer.Org and their efforts to raise awareness of the impact that malicious social engineering attacks have on companies as well as individuals.

Many of the most devastating attacks that have made the news lately have leveraged a combination of social engineering attacks with traditional technical cleverness. It is not enough to know and understand just how to deal with technical security issues but to properly protect your company a solid understanding of the “people issue” needs to be addressed.

Demonstrating the impact of social engineering attacks helps this goal by showing the world the actual effectiveness of this attack vector. This is why the BackTrack team will be supporting in bringing to Defcon 19 the Social Engineering Capture the Flag (SECTF) 2: “The Schmooze Strikes Back”.

Last year the SEORG team set a new standard by clearly demonstrated how easy it was for social engineers to extract information from targets on the phone. After over 300,000 downloads, our final report helped organizations make dramatic improvements of their security programs. Using the lessons we learned from Defcon 18, we expect to once again set new standards for raising awareness of social engineering issues.

This year the format is completely refreshed and with some dramatic improvements to the contest itself, it will be an event you do not want to miss. To find out more about this year’s SECTF or to show case your social engineering skills, check out the Social Engineering Defcon 19 CTF page to read all the details and register.

Infected Mushroom