Category Archives: Social Engineering
Cleaning crews and Keyloggers, oh my!
Capture The Flag competitions are very useful ways to rethink and find creative solutions to solve the challenge. The Social Engineering CTF caused me to think a few angles I hadn’t considered before. Top item of the flag list: Is IT Support handled in house or outsourced? All the way down to what technology the company is using. What’s contained in the photograph are potential attack vectors or key bits of information that could lead to exploitable opportunities. Take a gander J