Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Secrets of PickPocketing … Online Training with The Professional Opportunist

Back in October 2012 I attended a Pickpocket Training Day with Professional Opportunist James Brown, and I blogged about it on this site here. It was a great session and many people have asked me about it, but not everyone has ...
by Dale Pearson
0

 
 

Reality Bending … Online Hypnosis Training with James Brown

Subscribers and regular visitors to the blog will know I am a fan of hypnosis, and like most things I am passionate for I am always on the look out to discover new ways of doing things, gaining perspective of others and general...
by Dale Pearson
3

 

 

Objectives focused testing gives you more … More is More :)

Aside from the security testing not being what it really is (aka penetration tests which are vulnerability assessments, etc), we have a constant focus on what appears to be “controls” based security testing. These a...
by Dale Pearson
0

 
 

Quick Post – Thoughts on Loochs The Black Project

Just a quick post to share a short video I made a few weeks ago after reading Looch’s The Black Project. This was the most expensive book I have ever purchased at £290 pounds, and I did so to get into the mind of one of ...
by Dale Pearson
0