Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Hiding in plain sight… Playing it loud and proud

Happy New Year. 2011 has already gotten off to a hectic start for me, as I type this I am still in California working, but looking forward to flying back at the end of the week. In the last week I have tried out something a lit...
by Dale Pearson
0

 
 

The Year Cyber Criminals Went Corporate … Infograph by ProofPoint

Its been a while, but great to see another great InfoGraph provided by ProofPoint. This one is related to their most recent report on The Human Factor and the ongoing threat of Social Engineering based techniques used by the ad...
by Dale Pearson
0

 
 

How To Autorun Modules in BeEF … Browser Exploitation Framework

Unless you are the Social Engineer with the fastest fingers in the west, you are going to have a challenge on your hands trying to initiate the various BeEF modules of interest when you initially hook a compromised host. So to ...
by Dale Pearson
0

 

 

Social Compliance and Manipulation… The Art of Confidence

As human beings we are very good at making excuses, and always believing that some how we have it worse than the other guy. There is often that mentality that, its not we don’t want to do this or that, its just that ̷...
by Dale Pearson
0

 
 

Social Engineering Doesn’t Feature In Your Security Testing Strategy … Doing It Wrong!

Security maturity is an interesting thing, and something I am often discussing with those I work with as well as those at various companies in a wide range of industry sectors. Specifically I am mostly interested in the maturit...
by Dale Pearson
0