Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 
NLP

NLP for Social Engineers – Mike Murray

Not long after kicking off Head Hacker, I got speaking to Mike Murray. I am sure many of you will be familiar with his thoughts and work in the SE space. Well he made me aware of a recent project he has also kicked of which is ...
by Dale Pearson
1

 
 

A Rubbish Post.. Dumpster Diving

So I am sat here thinking what to write about this week, and I kept going over things, but for one reason or another my mind is elsewhere. I kept thinking, no, that will be a rubbish post. Then it hit me…. dumpster diving...
by Dale Pearson
0

 

 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 
 

Social Engineering CTF… Showing the value of testing the human element

In Vegas this year (July 2010) there was an interesting contest going on, it was a social engineering capture the flag setup by the great guys at www.social-engineer.org. This was a great event, and it has attracted some media ...
by Dale Pearson
0