Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

The Social Engineer's Playbook: A Practical Guide to Pretexting

The Social Engineer's Playbook

The Social Engineer’s Playbook was written by RedTeam Security founder and CEO, Jeremiah Talamantes. It is a practical guide to pretexting and a collection of Social Engineering pretexts for Hackers, Social Engineers, and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book.

About The Social Engineer’s Playbook

The Social Engineer’s Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers, Security Managers, CISOs and Security Analysts. Learn how to build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board, and others.

This book covers a very brief introduction to tools, such as: Maltego, Social-Engineer Toolkit, Dradis, Metasploit and Kali Linux among others. Crucial to any social engineering test is the information used to build it. Discover the most valuable sources of intel and how to put them to good use.

About The Author – Jeremiah Talamantes

Jeremiah Talamantes
Jeremiah Talamantes is the founder of RedTeam Security and RedTeam Security Training 

Jeremiah Talamantes has nearly 20 years in the IT security industry. He has a masters degree in Information Security & Assurance and an executive business education from the University of Notre Dame, Mendoza School of Business. Jeremiah is an active security researcher and an adjunct faculty member at Norwich University, College of Graduate Studies in Information Security & Assurance. He has held numerous leadership roles including CISO and expert consultant to several Fortune 500 companies. He is a CISSP, CCISO, CEH, CHFI, and CCENT.

Other Resources

Featured On

National TV news and media outlets often consult with us for our expertise as a
boutique, high-touch ethical hacking firm highly trained in a narrow field of cyber
security. Please click on any logo below to view the featured story.