Re: Social Engineering Data set

From: xun dong (xundong@cs.york.ac.uk)
Date: Thu Oct 12 2006 - 19:04:52 EDT


:) I have read that page and its reference several times. Thanks for
letting me know.

Matthew Leeds wrote:
> Much as I find many of their entries wildly incorrect and biased, I'd start here:
>
> http://en.wikipedia.org/wiki/Social_engineering_(computer_security)
>
> as in this case there are a large number of useful references in the entry.
>
> ----------
> ---Matthew
> *********** REPLY SEPARATOR ***********
>
> On 10/12/2006 at 12:27 PM Mustafa Yücelgen wrote:
>
>
>> Thah would be nice. 'Cos nowadays I'm trying to prepare a training for a
>> big
>> GSM Operator. And I need examples to convince the top management about the
>> needs.
>>
>> Good luck!
>>
>> -----Original Message-----
>> From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com] On
>> Behalf Of xun dong
>> Sent: Wednesday, October 11, 2006 1:32 PM
>> To: pen-test@securityfocus.com; security-basics@securityfocus.com
>> Subject: Social Engineering Data set
>>
>> Hello list;
>>
>> I am currently doing research on Social Engineering Attacks. Unlike the
>> technical hack, I found that there is few useful and well documented SE
>> attack examples on the Internet. So I decided to create a data set for SE
>> attacks, and I am willing to publish it for free on the Internet.
>>
>> However, I think only my own experience would not be able to make this
>> dataset as comprehensive as possible. So I would like to ask for help on
>> this list. If you think you have SE attack examples, you can email me.
>> Of course for confidential reason you should not use the real name in your
>> example. If you don't mind I will also publish your name along with the
>> example you provided. Thanks a lot in advance. I hope this could be a step
>> forwards in protecting against SE attacks.
>>
>> --
>> Xun Dong
>> Research Associate
>> Department of Computer Science
>> University of York
>>
>> ---------------------------------------------------------------------------
>> This list is sponsored by: Norwich University
>>
>> EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has
>> designated Norwich University a center of Academic Excellence in
>> Information
>> Security. Our program offers unparalleled Infosec management education and
>> the case study affords you unmatched consulting experience.
>> Using interactive e-Learning technology, you can earn this esteemed degree,
>> without disrupting your career or home life.
>>
>> http://www.msia.norwich.edu/secfocus
>> ---------------------------------------------------------------------------
>>
>>
>> ------------------------------------------------------------------------
>> This List Sponsored by: Cenzic
>>
>> Need to secure your web apps?
>> Cenzic Hailstorm finds vulnerabilities fast.
>> Click the link to buy it, try it or download Hailstorm for FREE.
>> http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
>> ------------------------------------------------------------------------
>>
>
>
>
>
> ------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
> http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
> ------------------------------------------------------------------------
>
>

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:11 EDT