Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Playing Nicely with Scammers … Wasting their time for giggles :)

So I am in the business of social engineering people (with authorisation of course), and depending on who you speak to this could be interpreted as scamming, conning, or generally straight up manipulation. The reason I do this ...
by Dale Pearson
15

 
 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 
 

Exploiting the Brain … The Power of Language

An experienced and effective social engineer has two main qualities. First of all they have the social part, they have the ability to blend in, build relationship, establish rapport, and make that unconscious connection. This t...
by Dale Pearson
2

 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

Lock Picking.. Graceful Entry Techniques

The ability to pick a lock may not be an essential social engineering skill, but I would say its an advantageous one to have, oh and its fun to. Wikipedia Definintion – Lock picking is the skill of unlocking a lock by ana...
by Dale Pearson
2