Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 
 

Lock Picking.. Graceful Entry Techniques

The ability to pick a lock may not be an essential social engineering skill, but I would say its an advantageous one to have, oh and its fun to. Wikipedia Definintion – Lock picking is the skill of unlocking a lock by ana...
by Dale Pearson
2

 

 

Maltego Transformtastic… Information Gathering Made Simple

So back on August 27th 2010 at 3:55am I had a great idea. I will do a quick video on Maltego basics 🙂 Then nearly 5 years went by and I never got around to doing it, mainly intimidated by the awesome videos Paterva do themse...
by Dale Pearson
1

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6