Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

The Quick Posts Category

Sometimes I do something, or come across some information and I feel like its worth sharing but don’t quite have anywhere it fits in. So thanks to the pointer by my mate Craig Balding I am borrowing Didier Stevens “...
by Dale Pearson
0

 
 

Derren Brown Pushed To The Edge … A Good Reminder

Tuesday the 12th January 2016, Derren Brown returned to our screens and presented us with Pushed To The Edge. The premise for the show was to demonstrate how social compliance can influence behaviour, and how plausible would it...
by Dale Pearson
0

 

 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3

 
 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1