Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Confirmation Bias … The Manipulation Assistant

I think most people would accept, that when it comes to building rapport and getting to a stage of some form of manipulation is normally always possible with anyone give a decent amount of time. This is great for making REAL fr...
by Dale Pearson
0

 
 

The Idiots That Get Socially Engineered

We are all familiar with Social Engineering, we experience it every day, its covered in the media and is utilised in various different contexts. However, a common theme that I read about, but also have people talk to me about i...
by Dale Pearson
0

 
 

Social Engineering Zombies… Getting people playing your game

In the wonderful world of InfoSec we often talk about zombies, and the associated botnet zombie army. With our army of machines we can do our evil bidding, and wreak havoc upon the unexpected users of the Interwebs. So what has...
by Dale Pearson
0

 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Finding Data In Data … Its So MetaData

I know the term “meta” is cool with the kids right now, but seriously talking about data, that can be found in data, that relates to data itself, thats just so meta man 🙂 If you are new to the term metadata then ...
by Dale Pearson
0