Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Remember Remember … Constructing A Memory Palace

So today is the Royal Wedding, and I am sure of you hadn’t forgotten that. However as we have discussed before the memory isn’t really the best at remembering stuff, and our subconscious is only to happy to fill in ...
by Dale Pearson
3

 
 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Setting your motivation… Mind Scripts

Getting into character is an important part of being successful on a social engineering engagement. You may be physically impersonating a sales guy, engineer, employee, or you may be carrying out your fiendish work remotely gat...
by Dale Pearson
2

 

 

Elicitation … Its what you say and how you say it!

The dictionary defines Elicitation as bringing or drawing out information, or to call forth and provoke a desired reaction. Elicitation is a powerful tool to anyone looking to influence and gather information in a relatively lo...
by Dale Pearson
2

 
 

Subliminal Hacking at IRISSCERT Cyber Crime Conference … Ireland Security Conference

I have the great pleasure of speaking at the 2011 IRISSCERT Cyber Crime Conference in Ireland this November. IRISSCERT Cyber Crime Conference The IRISSCERT Cyber Crime Conference will be held this year on Wednesday the 23rd of ...
by Dale Pearson
2