Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

How To Crack WPS with Pixie Dust … Offline Attacking

In this post we are looking at how vulnerable WPS makes your Access Point. WiFi Protected Setup makes it nice and easy for you to connect to your wireless devices by using a simple pin number, instead of your hard to guess pass...
by Dale Pearson
0

 
 

Text Message Scammers … ID Theft Attempt & Run

Thought I would share some info on a text scam I got a few weeks ago. I setup a fake email account, got a burner number to make relevant calls and generated fake name, address, card number etc to see how these guys would respon...
by Dale Pearson
1

 
 

Social Engineering… Is It Ethical??

When I speak to people (non Infosec passionate types) about the work and research I do around the content I post on Head Hacker, I normally get a few responses. Shock, Disgust and Intrigue. People are shocked because they are n...
by Dale Pearson
2

 

 

Head Hacker Speaking at GovCERT.NL Symposium 2010 in Rotterdam

The GOVCERT.NL Symposium is the event where technical professionals and non-technical from both the public and the private sector mingle freely. Or, as one visitor put it: “There are suits and ponytails, and they communic...
by Dale Pearson
0

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6