Subliminal Hacking
The Art and Science of Social Engineering


 
Posts Tagged ‘Social Engineering’
 

 

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1

 
 

What material is essential on a Social Engineering Course?

I have heard many people talk about the fact that it is rare to find a course on social engineering, and those they have attended or heard about have not been that interesting. So I was wondering, in your opinion what would mak...
by Dale Pearson
0

 
 

Whats my motivation darling? … The Pretext

There are many essential skills required to be successful at social engineering, and one we have mentioned before but never really gone into is Pretexting. The easiest way I find to describe a pretext is to consider the motivat...
by Dale Pearson
0

 

 

USB STICK GSM BUG … REVIEW

In April 2012 I was fortunate enough to be given a free USB Stick from Online Spy Shop that is a GSM Bug as part of a small give away they were running. I have had this sat on the shelf since it arrived but havent found the tim...
by Dale Pearson
0

 
 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0