Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Parvum S1.0 … Cracking Passwords In Style

Marty McFly: Wait a minute, Doc. Ah… Are you telling me that you built a time machine… out of a DeLorean? Dr. Emmett Brown: The way I see it, if you’re gonna build a time machine into a car, why not do it with...
by Dale Pearson
0

 
 

Playing Nicely with Scammers … Wasting their time for giggles :)

So I am in the business of social engineering people (with authorisation of course), and depending on who you speak to this could be interpreted as scamming, conning, or generally straight up manipulation. The reason I do this ...
by Dale Pearson
15