Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Lock Picking.. Graceful Entry Techniques

The ability to pick a lock may not be an essential social engineering skill, but I would say its an advantageous one to have, oh and its fun to. Wikipedia Definintion – Lock picking is the skill of unlocking a lock by ana...
by Dale Pearson
2

 

 

How To Collaborate With Maltego … Rolling Your Own XMPP Server

* I started this post in Feb 2014 but it took me a while to actually finish it 🙁 Aside from mentioning Maltego in my recommended OSINT Tools List, I have never gone into any detail about this awesome tool from Paterva. The m...
by Dale Pearson
3

 
 

USB STICK GSM BUG … REVIEW

In April 2012 I was fortunate enough to be given a free USB Stick from Online Spy Shop that is a GSM Bug as part of a small give away they were running. I have had this sat on the shelf since it arrived but havent found the tim...
by Dale Pearson
0