Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Attention Manipulation Techniques Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 

Global Gestures Don’t Get it Wrong

In my recent talk Social Engineering Like In the Movies – The Reality of Awareness and Manipulation I talk about how important it is to understand body language, especially in the right context. I also mention how even th...
by Dale Pearson
2

 
 

Objectives focused testing gives you more More is More :)

Aside from the security testing not being what it really is (aka penetration tests which are vulnerability assessments, etc), we have a constant focus on what appears to be “controls” based security testing. These a...
by Dale Pearson
0

 

 

91% Of All Attacks Attributable to Spear Phishing Infograph by ProofPoint

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the in...
by Dale Pearson
1

 
 

Wasting Time With The PC Wizard Scammers Fixing The Problems You Never Knew You Had

So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I...
by Dale Pearson
2