Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1

 
 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 

 

Whats my motivation darling? … The Pretext

There are many essential skills required to be successful at social engineering, and one we have mentioned before but never really gone into is Pretexting. The easiest way I find to describe a pretext is to consider the motivat...
by Dale Pearson
0

 
 

Now you see it, now you dont … Change Blindness

Change blindness is an interesting natural phenomena every human experiences on a pretty regular basis, but what is it exactly? Essentially its our inability to spot obvious changes that occur around us. There has been a fair...
by Dale Pearson
0