Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Pack up your troubles.. in your social engineering kit bag

Just a simple post this week, but you know what they say the best things come in the simplest of packages. 🙂 Like any good boy scout, you should always be prepared. So lets have a quick look at what we should have in our poc...
by Dale Pearson
0

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 

The glass half empty mentality… Failure is important

I thought I would take the opportunity to speak to all of you, both the people who I have exchanged DM’s and emails with, and those of you that are probably having these thoughts but not spoken to anyone about it. I am ta...
by Dale Pearson
2

 

 

Faking It To Make It … Fake Data Generation Recommendations List

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not ...
by Dale Pearson
1

 
 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3