Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Text Message Scammers … ID Theft Attempt & Run

Thought I would share some info on a text scam I got a few weeks ago. I setup a fake email account, got a burner number to make relevant calls and generated fake name, address, card number etc to see how these guys would respon...
by Dale Pearson
1

 
 

How To Crack WPS with Pixie Dust … Offline Attacking

In this post we are looking at how vulnerable WPS makes your Access Point. WiFi Protected Setup makes it nice and easy for you to connect to your wireless devices by using a simple pin number, instead of your hard to guess pass...
by Dale Pearson
0

 
 

Illusions of Trust … The Way of the Cyber Criminal

Trust is an important thing to most intelligent species, and without it relationships and general interactions cease to flourish and are nothing more than a professional exchange of dialogue. When you think about trust and the ...
by Dale Pearson
1

 

 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1

 
 

Objectives focused testing gives you more … More is More :)

Aside from the security testing not being what it really is (aka penetration tests which are vulnerability assessments, etc), we have a constant focus on what appears to be “controls” based security testing. These a...
by Dale Pearson
0