Subliminal Hacking
The Art and Science of Social Engineering


 
Posts Tagged ‘Social Engineering’
 

 

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1

 
 

What material is essential on a Social Engineering Course?

I have heard many people talk about the fact that it is rare to find a course on social engineering, and those they have attended or heard about have not been that interesting. So I was wondering, in your opinion what would mak...
by Dale Pearson
0

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 

 

How To Autorun Modules in BeEF … Browser Exploitation Framework

Unless you are the Social Engineer with the fastest fingers in the west, you are going to have a challenge on your hands trying to initiate the various BeEF modules of interest when you initially hook a compromised host. So to ...
by Dale Pearson
0

 
 

Social Engineering… Is It Ethical??

When I speak to people (non Infosec passionate types) about the work and research I do around the content I post on Head Hacker, I normally get a few responses. Shock, Disgust and Intrigue. People are shocked because they are n...
by Dale Pearson
2