Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Twitter Stalking with Bing Maps … Recontastic

So this is pretty old news as I think it was first announced on the Interwebs in mid to late 2010 and I could have swarn I blogged about it, but apparently not, perhaps it was just a tweet, who knows. Anyway, in the Maltego cla...
by Dale Pearson
2

 
 

Subliminal Hacking at IRISSCERT Cyber Crime Conference … Ireland Security Conference

I have the great pleasure of speaking at the 2011 IRISSCERT Cyber Crime Conference in Ireland this November. IRISSCERT Cyber Crime Conference The IRISSCERT Cyber Crime Conference will be held this year on Wednesday the 23rd of ...
by Dale Pearson
2

 
 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 

 

Elicitation … Its what you say and how you say it!

The dictionary defines Elicitation as bringing or drawing out information, or to call forth and provoke a desired reaction. Elicitation is a powerful tool to anyone looking to influence and gather information in a relatively lo...
by Dale Pearson
2

 
 

Hiding in plain sight… Playing it loud and proud

Happy New Year. 2011 has already gotten off to a hectic start for me, as I type this I am still in California working, but looking forward to flying back at the end of the week. In the last week I have tried out something a lit...
by Dale Pearson
0