Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Just Called To Say … Spoofed Your Caller ID

The aim of this post is to share tools for Social Engineers to include vishing in you engagements, and to make the rest of the world aware of just how simple and easy it is to Spoof someones Caller ID, so you can increase your ...
by Dale Pearson
0

 
 

How To Install BeEF … Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is an excellent tool for Social Engineers and Pentesters. This video provides a quick How To on installing it under Linux. The install from start to finish takes around 10 minutes, but ...
by Dale Pearson
4

 
 

Exploiting the Brain … The Power of Language

An experienced and effective social engineer has two main qualities. First of all they have the social part, they have the ability to blend in, build relationship, establish rapport, and make that unconscious connection. This t...
by Dale Pearson
2

 

 

Body Talk.. Its torsotastic

This week we are going to look at body language again. In a previous post we looked at how the legs and feet have a lot to tell us, in this post we are going to uncover what the upper body can reveal to us. The torso is made up...
by Dale Pearson
0

 
 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3