Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Corporate Red Teaming To Me

I am writing this blog post to share my thoughts on what it means to run and be part of a Corporate Red Team, I am sure there are similarities with Red Teams outside of the Corporate world but I don’t pretend to talk abou...
by Dale Pearson
0

 
 

Body Talk… Arms out rah rah rah

Hope everyone is off to a good week, what with Defcon, Blackhat etc I am sure many of you are travelling. I personally had a weekend break in Cardiff and enjoyed doing a little grey matter manipulation, as well as talking about...
by Dale Pearson
1