Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Invest in the Community…Schuyler Towne and Open Locksport

One of the best thing about the InfoSec community is the people. Sure like everywhere there are the idiots, big headed know it alls, and the leachers, but in general we are a supportive bunch, and happy to share. So this brings...
by Dale Pearson
0

 
 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 

 

Just Called To Say … Spoofed Your Caller ID

The aim of this post is to share tools for Social Engineers to include vishing in you engagements, and to make the rest of the world aware of just how simple and easy it is to Spoof someones Caller ID, so you can increase your ...
by Dale Pearson
0

 
 

How To Collaborate With Maltego … Rolling Your Own XMPP Server

* I started this post in Feb 2014 but it took me a while to actually finish it 🙁 Aside from mentioning Maltego in my recommended OSINT Tools List, I have never gone into any detail about this awesome tool from Paterva. The m...
by Dale Pearson
3