Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Social Engineering Competitions… Good or Bad?

I have had a few people mention to me in person, and via email and twitter about the social engineering competition that took place at DEFCON 18, and if I think it was right or not, as many people seem to have mixed feelings ab...
by Dale Pearson
1

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Social Engineering Doesn’t Feature In Your Security Testing Strategy … Doing It Wrong!

Security maturity is an interesting thing, and something I am often discussing with those I work with as well as those at various companies in a wide range of industry sectors. Specifically I am mostly interested in the maturit...
by Dale Pearson
0

 

 

Wasting Time With The PC Wizard Scammers … Fixing The Problems You Never Knew You Had

So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I...
by Dale Pearson
2

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2