Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

What material is essential on a Social Engineering Course?

I have heard many people talk about the fact that it is rare to find a course on social engineering, and those they have attended or heard about have not been that interesting. So I was wondering, in your opinion what would mak...
by Dale Pearson
0

 
 

Text Message Scammers … ID Theft Attempt & Run

Thought I would share some info on a text scam I got a few weeks ago. I setup a fake email account, got a burner number to make relevant calls and generated fake name, address, card number etc to see how these guys would respon...
by Dale Pearson
1

 

 

Easter Competition.. Win a Sha LoN Basic Pick Set

COMPETITION NOW CLOSED !!! As a special treat for Easter I am going to give away a Sha LoN Basic Pick Set to one of the Head Hacker Readers. Of course there is a catch, and you need to be in it to win it, and I will pick the wi...
by Dale Pearson
2

 
 

Social Engineering, What , When, Why and How

In the first series of posts I want to cover the basics of each topic. A good place to start is Social Engineering, so lets kick off with what its all about, when its used, as well as the why and how’s involved. Wikipedia...
by Dale Pearson
0