Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Confirmation Bias … The Manipulation Assistant

I think most people would accept, that when it comes to building rapport and getting to a stage of some form of manipulation is normally always possible with anyone give a decent amount of time. This is great for making REAL fr...
by Dale Pearson
0

 
 

How To Crack WPS with Pixie Dust … Offline Attacking

In this post we are looking at how vulnerable WPS makes your Access Point. WiFi Protected Setup makes it nice and easy for you to connect to your wireless devices by using a simple pin number, instead of your hard to guess pass...
by Dale Pearson
0

 
 

Understanding Communication Styles … DiSC Profiling

I have mentioned DiSC profiles in the past, but never really given it much clarity on the blog. My reason for writing this is really due to some changes in approach from a management perspective, but they are equally beneficial...
by Dale Pearson
0

 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

The Behavioural Table of Elements – Body Language

I recently became aware of a US based Intelligence and Behaviour Expert by the name of Chase Hughes. I picked up his book The Ellipsis Manual which has been a great addition to my collection of books and resources on body langu...
by Dale Pearson
0