Need a uniform to help sell the impersonation pretext and successfully bypass physical security? Then consider this secret cache of pretext aids and p...View Details

Add a new document to your intelligence gathering process to help enhance and discover new pretexts. You can follow along on social media using the ha...View Details

Explore the unplesant last resort, low tech solution to bypass front desk security policies. You can follow along on social media using the hashtag: ...View Details

Search the endless treasures of a company's lost and found to discover their true meanings. You can follow along on social media using the hashtag: #S...View Details

Discover a unique way to conceal listening devices and gain an unfair advantage in information gathering. You can follow along on social media using t...View Details

Need to seperate guards from the front desk? Consider using UAVs or drones. You can follow along on social media using the hashtag: #SocialEngineering...View Details

Ever consider how much information and pretext opportunities are contained within a locker room? You can follow along on social media using the hashta...View Details

Discover how important audio can be for phone pretexts and learn a new attack by spoofing audio. You can follow along on social media using the hashta...View Details

Learn how to safely simulate car troubles to allow for uninterupted active information gathering opportunites and pivots. You can follow along on soci...View Details

Elevators not giving you the access that you need? Discover a quick way to bypass their restrictions. You can follow along on social media using the h...View Details

Older Episodes »

Podbean App

Play this podcast on Podbean App