Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Exploiting the Brain … The Power of Language

An experienced and effective social engineer has two main qualities. First of all they have the social part, they have the ability to blend in, build relationship, establish rapport, and make that unconscious connection. This t...
by Dale Pearson
2

 
 

Tweaking your Critical Factor … Understanding RAS

In previous posts (probably over a year ago now) I have spoken about this thing called the critical factor. In the hypnosis world this is the gatekeeper or firewall between your conscious and subconscious mind, helping to kee...
by Dale Pearson
1

 
 
NLP

NLP for Social Engineers – Mike Murray

Not long after kicking off Head Hacker, I got speaking to Mike Murray. I am sure many of you will be familiar with his thoughts and work in the SE space. Well he made me aware of a recent project he has also kicked of which is ...
by Dale Pearson
1

 

 

The Risks of Posting in Social Networks … By Trend Micro

I found this awesome Infograph put together by Trend Micro on the Risks o Posting in Social Networks. I cant remember exactly where I found it now but I saved the image so I am posting it here. If you know where it came from fe...
by Dale Pearson
1

 
 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0