State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks

State of the Art Automation of Open Source Intelligence and Impersonation in Social Networks

Thursday, March 4, 2010
Pedro O. Varangot
RSA Security Conference 2010

Individuals and organizations have their private data disseminated in social networks systems and other open systems. Thus, attackers can explore published data in their (passive) information gathering phase to strengthen their attack. In this talk we analyze the privacy problem underlying social networks and the value they have to attackers. We will also present techniques used in impersonation attacks, and also show tools available for the active attack phase in a client-side pentesting.

Related information

Projects
Exomind

Tools
Exomind