Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3

 
 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 
 

How To Collaborate With Maltego … Rolling Your Own XMPP Server

* I started this post in Feb 2014 but it took me a while to actually finish it 🙁 Aside from mentioning Maltego in my recommended OSINT Tools List, I have never gone into any detail about this awesome tool from Paterva. The m...
by Dale Pearson
3

 

 

Remember Remember … Constructing A Memory Palace

So today is the Royal Wedding, and I am sure of you hadn’t forgotten that. However as we have discussed before the memory isn’t really the best at remembering stuff, and our subconscious is only to happy to fill in ...
by Dale Pearson
3

 
 

Exploiting the Brain … The Power of Language

An experienced and effective social engineer has two main qualities. First of all they have the social part, they have the ability to blend in, build relationship, establish rapport, and make that unconscious connection. This t...
by Dale Pearson
2