Subliminal Hacking
The Art and Science of Social Engineering


 
 

 

Wireless Attack and Audit Tools … Recommendations List

Wireless recon and exploitation may not be one of the techniques that first jumps to mind when you think of Social Engineering, but its a valid attack vector for both the on premises recon and attacks (direct to the wireless in...
by Dale Pearson
6

 
 

Attention Manipulation Techniques … Natural Buffer Overflows

A key part of being a Social Engineer is being able to create yourself windows of opportunity. These may be to distract peoples attention whilst you slip past a door, pull some keys from a key cabinet, acquire an access card ...
by Dale Pearson
2

 
 

Facebook Graph … Social Engineering OSINT gets Graphical

So Facebook currently have a new offering in beta form, and its called ‘Facebook Graph’. Woopie Doo I hear you cry, but it may actually be something to sauce up your Social Networking OSINT a little more if you are ...
by Dale Pearson
1

 

 

How To Integrate Metasploit with BeEF … Browser Exploitation Framework

So the Browser Exploitation Exploitation Framework (BeEF) has some awesome exploitation modules of its own, but when you combine it with the added awesome sauce that is Metasploit you get to have even more fun. Its like a Socia...
by Dale Pearson
0

 
 

How To Autorun Modules in BeEF … Browser Exploitation Framework

Unless you are the Social Engineer with the fastest fingers in the west, you are going to have a challenge on your hands trying to initiate the various BeEF modules of interest when you initially hook a compromised host. So to ...
by Dale Pearson
0