Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Longlining … The 2013 Social Engineering Threat

I came across another great InfoGraph today from proofpoint on “Longlining” and I thought I would share it. This approach uses more targeted phishing emails along with various techniques in an attempt to avoid detec...
by Dale Pearson
3

 
 

How To Install BeEF … Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is an excellent tool for Social Engineers and Pentesters. This video provides a quick How To on installing it under Linux. The install from start to finish takes around 10 minutes, but ...
by Dale Pearson
4

 
 

The glass half empty mentality… Failure is important

I thought I would take the opportunity to speak to all of you, both the people who I have exchanged DM’s and emails with, and those of you that are probably having these thoughts but not spoken to anyone about it. I am ta...
by Dale Pearson
2

 

 

Red Team Hiring – Are You The One?

Despite the madness that is Covid-19, I have been in the fortunate position to be hiring Red Teamers to join the amazing team I have the pleasure to work with. When hiring, people regularly reach out to me asking what I am look...
by Dale Pearson
0

 
 

Lock Picking.. Graceful Entry Techniques

The ability to pick a lock may not be an essential social engineering skill, but I would say its an advantageous one to have, oh and its fun to. Wikipedia Definintion – Lock picking is the skill of unlocking a lock by ana...
by Dale Pearson
2