Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

How To Autorun Modules in BeEF … Browser Exploitation Framework

Unless you are the Social Engineer with the fastest fingers in the west, you are going to have a challenge on your hands trying to initiate the various BeEF modules of interest when you initially hook a compromised host. So to ...
by Dale Pearson
0

 
 

Social Engineering Competitions… Good or Bad?

I have had a few people mention to me in person, and via email and twitter about the social engineering competition that took place at DEFCON 18, and if I think it was right or not, as many people seem to have mixed feelings ab...
by Dale Pearson
1

 

 

Playing Nicely with Scammers … Wasting their time for giggles :)

So I am in the business of social engineering people (with authorisation of course), and depending on who you speak to this could be interpreted as scamming, conning, or generally straight up manipulation. The reason I do this ...
by Dale Pearson
15

 
 

The Session Convention – EVENT Mentalism

2010 was my first and last visit to the Blackpool Magic Convention, I had a great time there but I really only went there to meet with some hypnosis people and dip my toe into the magic community. I meet some great people there...
by Dale Pearson
0