Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Social Engineering, What , When, Why and How

In the first series of posts I want to cover the basics of each topic. A good place to start is Social Engineering, so lets kick off with what its all about, when its used, as well as the why and how’s involved. Wikipedia...
by Dale Pearson
0

 
 

Quick Post – Instant Water into Ice Video

Over Christmas 2014 I caught up with some recorded TV, specifically Dynamo : Magician Impossible. One of the episodes I liked featured an effect where Dynamo take a bottle of water, pours some out and then shakes it and the wat...
by Dale Pearson
0

 
 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 

 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3

 
 

Confirmation Bias … The Manipulation Assistant

I think most people would accept, that when it comes to building rapport and getting to a stage of some form of manipulation is normally always possible with anyone give a decent amount of time. This is great for making REAL fr...
by Dale Pearson
0