Subliminal Hacking
The Art and Science of Social Engineering


In The Spotlight


Hypnosis

Reality Bending … Online Hypnosis Training with James Brown

Posted  July 24, 2016  by  Dale Pearson

Subscribers and regular visitors to the blog will know I am a fan of hypnosis, and like most things I am passionate for I am always on the look out to discover new ways of doing things, gaining perspective of others and generally a healthy thirst for knowledge. You will of noticed I have purchased […]

Full Story »

Review

Secrets of PickPocketing … Online Training with The Professional Opportunist

Posted  March 11, 2016  by  Dale Pearson

Back in October 2012 I attended a Pickpocket Training Day with Professional Opportunist James Brown, and I blogged about it on this site here. It was a great session and many people have asked me about it, but not everyone has the time to travel, or may have logistical and financial constraints based on geographical […]

Full Story »

Misdirection

Faking It To Make It … Fake Data Generation Recommendations List

Posted  July 17, 2015  by  Dale Pearson

Depending on your history and how you got into InfoSec you may or may not of been exposed to the world of developer testing, if you did I am sure you have many unhappy memories of arguing why “real” data should not be used in the testing world, and if like me you have horror […]

Full Story »

Social Engineering

91% Of All Attacks Attributable to Spear Phishing … Infograph by ProofPoint

Posted  December 11, 2013  by  Dale Pearson

I just received an email from Proofpoint, and its another one of their great Infographs. This is a great Infograph re-enforcing the fact that it only takes a single breach for the cost to be significant. Not surprisingly the information shows that 91% of All Attacks have some form of phishing attribution, and 95% of […]

Full Story »

Subliminal Hacking

Wasting Time With The PC Wizard Scammers … Fixing The Problems You Never Knew You Had

Posted  November 20, 2013  by  Dale Pearson

So its a cold Monday morning in November 2013 and the phone rings, who could this be? Sadly its not someone calling me to tell me there are millions of pounds to be had if I can just send some money over, instead it turns out I have computer issues, but the friendly certified Microsoft […]

Full Story »

 
 

 

How To Crack WPS with Pixie Dust … Offline Attacking

In this post we are looking at how vulnerable WPS makes your Access Point. WiFi Protected Setup makes it nice and easy for you to connect to your wireless devices by using a simple pin number, instead of your hard to guess pass...
by Dale Pearson
0

 
 

Social Engineering 101 Workshop … Hash Days 2011 Lucerne Switzerland

This year I have the honour of giving a workshop at Hash Days 2011 in Lucerne Switzerland. The course will run on the 26th and 27th October 2011, coffee breaks, snacks and lunch will be provided, all located at the Radisson Blu...
by Dale Pearson
0

 
 

Red Team Hiring – Are You The One?

Despite the madness that is Covid-19, I have been in the fortunate position to be hiring Red Teamers to join the amazing team I have the pleasure to work with. When hiring, people regularly reach out to me asking what I am look...
by Dale Pearson
0

 

 

Social Engineering CTF… Showing the value of testing the human element

In Vegas this year (July 2010) there was an interesting contest going on, it was a social engineering capture the flag setup by the great guys at www.social-engineer.org. This was a great event, and it has attracted some media ...
by Dale Pearson
0

 


 

How To Collaborate With Maltego … Rolling Your Own XMPP Server

* I started this post in Feb 2014 but it took me a while to actually finish it šŸ™ Aside from mentioning Maltego in my recommended OSINT Tools List, I have never gone into any detail about this awesome tool from Paterva. The m...
by Dale Pearson
3