SlideShare a Scribd company logo
SE VS PREDATOR
Using Social Engineering in ways I never thought
Christopher Hadnagy
www.social-engineer.com
HUMAN HACKING: HOURS OF FAMILY FUN
Yes I have a really cool job that is a ton of fun
TILL….
 Broke into over a dozen places, some even armed
 Sent over 15 million phishing emails
 Made 1000’s of vishing calls
 Got to write 3…. 4 books….
 Get trolled by Dave Kennedy (non-stop)
 Travel the globe teaching, hacking and having a great time
SO MUCH FUN….
IT STOPPED BEING FUN ALL OF A SUDDEN
RESEARCH INTO GPS DATA BEING EMBEDDED IN PHOTOS
LEAD ME TO….
THEN SOME INTERESTING THINGS OCCURRED
 Over 2 dozen women reached out
 Victims with real stories
 Organizations with real problems… like…
SAD BUT REAL
 Logged using devices to log into child porn
forums
 Used same devices to take photos and video of
child sex abuse
 Trying to hide abuse from his wife and company
WHERE IS HE NOW?
THEN THE PHONE RINGS….
…….PHONE RINGS……
Them - “Can you help us catch a guy who is trafficking children?”
Me - “Um why me? Don’t you want some cops or something?”
Them - “What we need to do is establish enough proof so they can get him…”
USING SE SKILLS IN A WAY I NEVER THOUGHT
….THAT’S WHEN IT HIT ME…..
WHAT IF I COULD HARVEST
TALENT FROM THIS COMMUNITY
TO HELP LOCATE AND TRACK
PERPETRATORS, BUILD TOOLS TO
MAKE THIS JOB EASIER AND
WORK WITH LAW ENFORCEMENT
TO BRING THEM TO JUSTICE
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never thought
1950’s 12 year old
1960’s 12 year old
1970’s 12 year old
1990’s 12 year old
2018’s 12 year old
THEPROBLEM
The over sexualization of younggirls and boys
THEPROBLEM
THEPROBLEM
Our Mission is to unmask online anonymous child predators and help bring them
to justice
WHAT WE ARE NOT
WHAT WE ARE
Social Engineers
Hackers (white hats only)
OSINT Experts
Parents, humans and people who want to help
www.innocentlivesfoundation.org
Q&A
Twitter: @InnocentOrg

More Related Content

PPT
Internet Safety
PPTX
Internet Safety For Kids By Tanmay
PPT
Internet Safety for Parents
PPT
E safety training ~ what ofsted are looking for by stephen carrick-davies
PPT
Bullying presentation
PPTX
Internet Safety Presentation for Parents
PDF
Coding to fight online abuse
PPTX
Power point cybercrime
Internet Safety
Internet Safety For Kids By Tanmay
Internet Safety for Parents
E safety training ~ what ofsted are looking for by stephen carrick-davies
Bullying presentation
Internet Safety Presentation for Parents
Coding to fight online abuse
Power point cybercrime

Similar to Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never thought (20)

PPTX
Power point cybercrime
PPT
Internet Safety
PDF
Cybercrimes (Against Children)
PPTX
prt. 1...Online Pedophiles
PDF
Perspectives on project based teaching and “blended learning” to develop ethi...
PPT
Keeping your Children Safe Online
PPTX
Keeping Children Safe Online
PPTX
Internet predators:parents clueless?
PPTX
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
PDF
Cyberstalking dangers
PDF
Digital Citizenship Symposium - Slide Compilation
PPTX
Digital Citizenship for Teens
PPTX
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
PPT
Chapter 12: Computer Mediated Communicationcmc
PPTX
Family Online Safety: Truth and Consequences
PPT
PPT
PPT
E safety training for foster carers by stephen carrick-davies jan 2013
PDF
Datascienceforsocialgood humantrafficking-161019202803
Power point cybercrime
Internet Safety
Cybercrimes (Against Children)
prt. 1...Online Pedophiles
Perspectives on project based teaching and “blended learning” to develop ethi...
Keeping your Children Safe Online
Keeping Children Safe Online
Internet predators:parents clueless?
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
Cyberstalking dangers
Digital Citizenship Symposium - Slide Compilation
Digital Citizenship for Teens
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
Chapter 12: Computer Mediated Communicationcmc
Family Online Safety: Truth and Consequences
E safety training for foster carers by stephen carrick-davies jan 2013
Datascienceforsocialgood humantrafficking-161019202803

More from EC-Council (20)

PPTX
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
PDF
Cloud Security Architecture - a different approach
PPTX
Phases of Incident Response
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PDF
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
PDF
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
War Game: Ransomware – Global CISO Forum 2019
PPTX
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
PPTX
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
PPTX
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
PPTX
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
Cloud Security Architecture - a different approach
Phases of Incident Response
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
War Game: Ransomware – Global CISO Forum 2019
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology

Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never thought

  • 1. SE VS PREDATOR Using Social Engineering in ways I never thought Christopher Hadnagy www.social-engineer.com
  • 2. HUMAN HACKING: HOURS OF FAMILY FUN Yes I have a really cool job that is a ton of fun
  • 3. TILL….  Broke into over a dozen places, some even armed  Sent over 15 million phishing emails  Made 1000’s of vishing calls  Got to write 3…. 4 books….  Get trolled by Dave Kennedy (non-stop)  Travel the globe teaching, hacking and having a great time SO MUCH FUN….
  • 4. IT STOPPED BEING FUN ALL OF A SUDDEN
  • 5. RESEARCH INTO GPS DATA BEING EMBEDDED IN PHOTOS LEAD ME TO….
  • 6. THEN SOME INTERESTING THINGS OCCURRED  Over 2 dozen women reached out  Victims with real stories  Organizations with real problems… like…
  • 7. SAD BUT REAL  Logged using devices to log into child porn forums  Used same devices to take photos and video of child sex abuse  Trying to hide abuse from his wife and company
  • 8. WHERE IS HE NOW?
  • 9. THEN THE PHONE RINGS…. …….PHONE RINGS…… Them - “Can you help us catch a guy who is trafficking children?” Me - “Um why me? Don’t you want some cops or something?” Them - “What we need to do is establish enough proof so they can get him…”
  • 10. USING SE SKILLS IN A WAY I NEVER THOUGHT
  • 11. ….THAT’S WHEN IT HIT ME….. WHAT IF I COULD HARVEST TALENT FROM THIS COMMUNITY TO HELP LOCATE AND TRACK PERPETRATORS, BUILD TOOLS TO MAKE THIS JOB EASIER AND WORK WITH LAW ENFORCEMENT TO BRING THEM TO JUSTICE
  • 13. 1950’s 12 year old 1960’s 12 year old 1970’s 12 year old 1990’s 12 year old 2018’s 12 year old
  • 14. THEPROBLEM The over sexualization of younggirls and boys
  • 17. Our Mission is to unmask online anonymous child predators and help bring them to justice
  • 18. WHAT WE ARE NOT
  • 19. WHAT WE ARE Social Engineers Hackers (white hats only) OSINT Experts Parents, humans and people who want to help