Blog
Jul 9, 2009
Social Engineering Contest – Defcon 2009
Social Engineering Contest – Defcon 2009
2 min read

Social Engineer your way to a free course!
DC718 and Telephreak are bringing Social Engineering back to Defcon.
Offensive Security has linked together with DC718, Telephreak, the contest/event Goons Pyr0 and Russr and www.social-engineer.org to have the best of the best to judge and help mold this contest into the display of the serious threat that still exists with this attack vector. For more information, check www.defconsecontest.com
Consisting of two rounds, teams will compete for the bragging rights of “Best Social Engineer @ #DefCon 17 , 2009.” and ONE free “Pentesting with BackTrack” online course for the winning team. With a few simple rules, the Social Engineering contest is open to any form, style and exploit you wish to bring, in so long as you can follow the rules and not endanger or disseminate anyone’s credentials or personal information.
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec

Federal
Addressing the Unique Cybersecurity Challenges Faced by Government Agencies
Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.
Feb 12, 2025
8 min read

Enterprise Security
Building a Cyber-Resilient Public Sector Through Hands-on Security Training
Learn how hands-on cybersecurity training equips public sector teams to protect critical infrastructure, featuring real-world cases from Atlanta, Oldsmar, and Texas that demonstrate why practical experience trumps theoretical knowledge alone. Discover why agencies are moving beyond certifications to combat-ready security training.
Feb 5, 2025
4 min read

Research & Tutorials
CVE-2025-21298: A Critical Windows OLE Zero-Click Vulnerability
Explore CVE-2025-21298, a critical Windows OLE zero-click flaw enabling RCE via email. Learn its risks, impact, and how to defend against attacks.
Feb 3, 2025
3 min read