Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Social Engineering Zombies… Getting people playing your game

In the wonderful world of InfoSec we often talk about zombies, and the associated botnet zombie army. With our army of machines we can do our evil bidding, and wreak havoc upon the unexpected users of the Interwebs. So what has...
by Dale Pearson
0

 
 

The glass half empty mentality… Failure is important

I thought I would take the opportunity to speak to all of you, both the people who I have exchanged DM’s and emails with, and those of you that are probably having these thoughts but not spoken to anyone about it. I am ta...
by Dale Pearson
2

 
 

What material is essential on a Social Engineering Course?

I have heard many people talk about the fact that it is rare to find a course on social engineering, and those they have attended or heard about have not been that interesting. So I was wondering, in your opinion what would mak...
by Dale Pearson
0

 

 

Facebook Graph … Social Engineering OSINT gets Graphical

So Facebook currently have a new offering in beta form, and its called ‘Facebook Graph’. Woopie Doo I hear you cry, but it may actually be something to sauce up your Social Networking OSINT a little more if you are ...
by Dale Pearson
1

 
 

How To Crack WPS with Pixie Dust … Offline Attacking

In this post we are looking at how vulnerable WPS makes your Access Point. WiFi Protected Setup makes it nice and easy for you to connect to your wireless devices by using a simple pin number, instead of your hard to guess pass...
by Dale Pearson
0