Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1

 
 

Social Engineering Zombies… Getting people playing your game

In the wonderful world of InfoSec we often talk about zombies, and the associated botnet zombie army. With our army of machines we can do our evil bidding, and wreak havoc upon the unexpected users of the Interwebs. So what has...
by Dale Pearson
0

 
 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 

 

Misdirection.. Now you see it, now you dont

Misdirection, is the hand quicker than the eye? I am sure we are all familiar with misdirection, I focus your attention on my left hand, whilst I do the old switcheroo with my right hand, and what do you know I made a coin disa...
by Dale Pearson
1

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2