Subliminal Hacking
The Art and Science of Social Engineering


 
Posts Tagged ‘Subliminal Hacking’
 

 

How To Install BeEF … Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is an excellent tool for Social Engineers and Pentesters. This video provides a quick How To on installing it under Linux. The install from start to finish takes around 10 minutes, but ...
by Dale Pearson
4

 
 

Subliminal Hacking at Hash Days 2011 … Swiss Security Conference

Hashdays is the premier technical security conference in the center of Switzerland organized by DEFCON Switzerland. During 4 days the center of Switzerland will become also the center of IT security knowledge transfer. On Octo...
by Dale Pearson
3

 
 

Easter Competition.. Win a Sha LoN Basic Pick Set

COMPETITION NOW CLOSED !!! As a special treat for Easter I am going to give away a Sha LoN Basic Pick Set to one of the Head Hacker Readers. Of course there is a catch, and you need to be in it to win it, and I will pick the wi...
by Dale Pearson
2

 

 

Its Hypnosis Jim, but not as we know it.. Hypnosis without trance

Once again I am going to be jabbering on about Hypnosis again. So if you have not noticed by now hypnosis is something that is of great interest to me, and I think having at minimum an understanding of hypnotic language is a va...
by Dale Pearson
2

 
 

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1