Social-Engineering attacks are on the rise from hackers across the world, and we are still failing as security professionals to use these in penetration tests. With the increased security around web applications, firewalls, HIPS, and everything else trying to prevent us, Social-Engineering allows an effective way for us to bypass security mechanisms and compromise the network. This talk will go over the different attack methods to consider when performing social-engineering attacks during a penetration test and how to drastically increase the success rate of compromise during an attack. In addition, a new version of the Social-Engineering Toolkit (SET) will be dropping at the same time. If your not familiar with SET, its a social-engineers swiss army knife for performing multiple methods of Social-Engineering attacks. This is the largest release of SET yet, and you don't want to miss it!