Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Social Engineering Zombies… Getting people playing your game

In the wonderful world of InfoSec we often talk about zombies, and the associated botnet zombie army. With our army of machines we can do our evil bidding, and wreak havoc upon the unexpected users of the Interwebs. So what has...
by Dale Pearson
0

 
 

Social Engineering… Is It Ethical??

When I speak to people (non Infosec passionate types) about the work and research I do around the content I post on Head Hacker, I normally get a few responses. Shock, Disgust and Intrigue. People are shocked because they are n...
by Dale Pearson
2

 
 
NLP

Common Practice to Witchcraft … Why do we challenge before exposure?

This months post is really a rant, but hopefully still has some informative value 🙂 A few weeks ago now Chris Nickerson and I were discussing some research on influence and manipulation, some of which was in relation to Ross...
by Dale Pearson
0

 

 

How To Autorun Modules in BeEF … Browser Exploitation Framework

Unless you are the Social Engineer with the fastest fingers in the west, you are going to have a challenge on your hands trying to initiate the various BeEF modules of interest when you initially hook a compromised host. So to ...
by Dale Pearson
0

 
 

Elicitation … Its what you say and how you say it!

The dictionary defines Elicitation as bringing or drawing out information, or to call forth and provoke a desired reaction. Elicitation is a powerful tool to anyone looking to influence and gather information in a relatively lo...
by Dale Pearson
2