Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Hiding in plain sight… Playing it loud and proud

Happy New Year. 2011 has already gotten off to a hectic start for me, as I type this I am still in California working, but looking forward to flying back at the end of the week. In the last week I have tried out something a lit...
by Dale Pearson
0

 
 

Help a Hacker Movie Get Made … Support The Root Kit on Kickstarter

Updated: Sadly this project didn’t meet the funding level required. I am sad about this, but perhaps the team can try again another time. Just a quick semi selfish post here 🙂 So I asked people to support a KickStarter...
by Dale Pearson
0

 
 
NLP

Common Practice to Witchcraft … Why do we challenge before exposure?

This months post is really a rant, but hopefully still has some informative value 🙂 A few weeks ago now Chris Nickerson and I were discussing some research on influence and manipulation, some of which was in relation to Ross...
by Dale Pearson
0

 

 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6