Subliminal Hacking
The Art and Science of Social Engineering


 
Author Archive
 

 

Ethical Boundaries of Simulated Testing

Like most days social media is flowing with opinions, perspectives, ego and testosterone 🙂 The most recent discussions that have sparked my interest have been those around what is or in many cases isn’t considered to b...
by Dale Pearson
0

 
 

Quick Post – Instant Water into Ice Video

Over Christmas 2014 I caught up with some recorded TV, specifically Dynamo : Magician Impossible. One of the episodes I liked featured an effect where Dynamo take a bottle of water, pours some out and then shakes it and the wat...
by Dale Pearson
0

 
 

What material is essential on a Social Engineering Course?

I have heard many people talk about the fact that it is rare to find a course on social engineering, and those they have attended or heard about have not been that interesting. So I was wondering, in your opinion what would mak...
by Dale Pearson
0

 

 

How To Install BeEF … Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is an excellent tool for Social Engineers and Pentesters. This video provides a quick How To on installing it under Linux. The install from start to finish takes around 10 minutes, but ...
by Dale Pearson
4

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2