DEF CON 27 Social Engineering Village Notes

Chris Hadnagy - SE Village 10 Year Anniversary: A Look Back

Notes By Aryan Giri

Speaker: Chris Hadnagy, Founder of Social-Engineer.org and Social Engineering Village

Background: 10+ years running DEF CON Social Engineering Village, author, security researcher

Key Focus: Lessons learned from a decade of social engineering competitions, industry evolution, and professional ethics

The Origin Story: DEF CON 17 Catalyst

Chris Hadnagy shares the humble beginnings of the Social Engineering Village, born from a problematic social engineering competition at DEF CON 17 that didn't align with ethical principles.

Founding Moment: "They were calling random college girls and getting their credit card numbers and not muting those numbers while they were being read. I was horrified. I get paid to do this by really big companies and this is not a great thing to have on video."

The Initial Challenge:

"I just got social engineered by Jeff Moss. I was just telling you what you should do, I wasn't saying I wanted to do it. He's like great, we'll see you next year with your competition."

DEF CON Evolution: Year by Year Growth

DEF CON 18

First SEC CTF: "How Strong is Your Schmooze?" - 175 sq ft room, court stenographer for transcripts, first black badge awarded

DEF CON 19

"The Smooth Strikes Back" - Room expanded, continued success, began considering additional structured activities

DEF CON 20

"Battle of the Sexes" - First kids competition, NSA Director General Alexander visit and director's coin award

DEF CON 21

"Who's the Deadliest Social Engineer?" - Women's participation dramatically increased, infamous "nerf gun kids competition"

DEF CON 22-23

Tag team competitions, Mission Impossible challenges, speaking tracks added, room expansion campaigns

DEF CON 24-27

Industry-specific themes, team expansion, professional framework development, SC Village conference launch

NSA Recognition: "The director of the NSA is here he'd like to see you... He awarded me a director's coin and said 'son what you're doing is great for our country, keep doing it.' After that, no more newspaper articles about us being scary hackers."

Red Team Insights: Practical Social Engineering Lessons

OSINT Correlation = Success

Winning competitors spend 60+ hours on reconnaissance and produce 50+ page reports. Deep knowledge of target companies (acronyms, internal language, employee names) directly correlates with competition success.

Internal Pretexts Work Best

Survey pretexts generally fail except when tied to recent actual surveys. Internal employee personas consistently outperform external pretexts in vishing attacks.

Tag Team Innovation

DEF CON 22 introduced tag team competitions where partners had to hand off calls seamlessly. Successful pretext: "I'm training a new recruit on Adobe Connect" to explain multiple voices.

Industry-Specific Targeting

Themes evolved to focus on specific industries: telecommunications, information security, gaming, transportation, alcohol/tobacco/firearms manufacturing. Avoid government, banks, and healthcare due to legal risks.

Professionalism Over Aggression

Only one disqualification in 10 years (for threatening termination). Proves effective social engineering doesn't require fear, anger, or threats - just strategic communication.

Real-Time Adaptation

Successful competitors demonstrate ability to pivot when encountering trained defenders. Companies showing improvement by asking legitimate verification questions.

Industry Impact & Career Development Statistics

Career Transformation

Before competing: 39% in InfoSec, 61% not in InfoSec. After competing: 72% entered InfoSec, 28% not in InfoSec

Time Investment

Winning reports average 60+ hours of OSINT work and 50+ pages of detailed analysis

Industry Growth

Google search trends for "social engineering" show massive increase from 2009 to 2019

Market Penetration

Only 15% of US companies actively conduct phishing training - massive growth potential

Training Ground Success: "72% of people decided to get into InfoSec after competition. This is a training ground - a beginning training ground where people can take that leap and say 'wow that was actually more fun and easier than I thought it would be.'"

Professional Ethics & Industry Standards

The Social Engineer Code of Ethics:

Leave Them Better

Core mantra maintained throughout all activities. Only one disqualification in decade for threatening someone's job

Education Focus

All activities designed to educate rather than simply exploit. Framework adopted by European country for national pen testing standards

Professional Boundaries

Avoid government, banking, and healthcare targets due to legal and ethical concerns. No reason to approach these lines

Industry Professionalism Challenges:

Live Tweeting Pen Tests

Industry leaders unanimously condemn live tweeting client engagements as "breach of contract," "wrong and stupid," and "unprofessional" - damages client trust and confidence

"100% Success" Myth

Moving beyond ego-driven approaches to focus on improving client security rather than proving attacker superiority

Collaboration Over Competition

With only 15% market penetration, there's enough work for everyone without bad-mouthing competitors

"You can be a professional social engineer but you don't have to be a bad person. You don't have to use fear, you don't have to use anger, you don't have to use extreme emotions to get the job done, and yet you could still leave room for education."

Practical Red Team Techniques & Examples

Successful Pretext Examples from SEC CTF:

Training Manager Pretext

"I'm working on training a new recruit. We're on Adobe Connect, that's why the number doesn't look real. I want to listen to him while he does the call and grade him after."

Survey Follow-up

"Your survey data didn't get sent properly. I need to redo it verbally to make sure we capture your responses correctly."

Security Concern

"There's this big hacker convention going on called DEFCON. I think we're a target and want to make sure your machines are secure. What OS are you on?"

Defensive Improvements Observed:

Real-World Impact: "We had a few people that answered the phone today and asked legitimate questions, forced the caller into giving them details, showing that they had some training and real critical thought. That's amazing and wonderful to see."

Key Takeaways & Future Directions

Decade-Long Lessons:

  1. Social engineering remains a critical attack vector that requires professional attention
  2. Ethical approaches are not only possible but more effective long-term
  3. Deep OSINT preparation directly translates to social engineering success
  4. The industry serves as a valuable training ground for new professionals
  5. Collaboration and professionalism elevate the entire security community
  6. Client education and improvement should be the ultimate goal
Community Vision: "The bad guys band together, they share secrets on their forums. There's no reason for us not to do the same exact thing. We can really leave each other better for having met each other and still grow in this industry."

Future Initiatives:

"The competition was born at the biggest hacker convention with the most volatile network on planet Earth, but with a goal to show how social engineering was dangerous and still a very viable vector, but if we can change it, it can change your life for the better if you allow it."