Hacking the Mind: Hypnosis, NLP, and Shellcode

Hacking the Mind: Hypnosis, NLP, and Shellcode

Mike Murray

The similarities between the methods used to exploit a computer network and the language patterns involved in hypnosis and neuro linguistic programming (NLP) are striking. In this talk, nCircle’s director of vulnerability research Mike Murray (who is also a Master NLP practitioner and certified clinical hypnotherapist) will demonstrate the use of hypnotic language patterns, metaphors, and other patterns of influence, as well as showing how a good hypnotist structures inductions in a similar way to the methods of a skilled computer hacker. Hypnotic analogues to buffer overflows, shellcode, and other types of computer attacks will be demonstrated, leaving the audience with a deeper appreciation for language patterns and their effect on the human mind.

Friday 2000
Area B
Download the audio of this presentation:

Compact Size MP3 (16Kbps Mono)

source page of more audios


Time Area A Area B
1000 Network Monitoring and the Law Flash Sucks for Advertisers – The Digital Divide
1100 Hackers And Academia RFID Privacy – Old Threats and New Attacks
1200 How to Steal Someone’s Implanted RFID – And Why You’d Want To The Life and Times of Alan Turing, Father of the Computer
1300 Magnetic Stripe Technology and the New York City MetroCard Building the Anti-Big Brother Databases
1400 Lockpicking: Exploits for Mechanical Locks Hacking Copyright and Culture
1500 The Monochrom Collective
1600 Keynote Address Friday: Richard Stallman Proactively Secure Programming Techniques
1700 The Art of Electronic Deduction
1800 Europe Has Hackers Too Bin Laden, National Intelligence, and How NOT To Spend the Taxpayer’s Treasure
1900 The Future of Wireless Pen Testing Weird Technology
2000 “Off The Hook” – The Indecent Version Hacking the Mind: Hypnosis, NLP, and Shellcode
2100 Aether Madness with the Prometheus Radio Project
2200 2600 Meetings: A Valuable Resource or a Waste of Time? How to Talk to the Mainstream Media
2300 The Geek Comedy Tour 3000 Binary Revolution Radio
0030 Biometrics in Science Fiction
Saturday, July 22 2006
Time Area A Area B
0900 E-gold – As Misunderstood As Hackers
1000 Radio Communications for Hackers, Amateurs, and Activists Low Level Firmware Analysis and Hacking
1100 Wireless Security Flaws Under The Desk at MIT
1200 Citizen Engineer – Consumer Electronics Hacking and Open Source Hardware Phone Phreaking 101
1300 Retrocomputing IBOC vs. DAB-T: In-Band vs. Multiplexed Digital Radio
1400 Keynote Address Saturday: Michael Hart Making Reliable Links Using WiFi
1500 VoIP Unlocking
1600 Coupon Hacking
1700 Privacy Is Dead – Get Over It Password Cracking and Time-Memory Tradeoff
1800 Alienation and Engagement
1900 Hackers in Prison Constructing Cryptographic Protocols
2000 Project MF Breaking Down the Web of Trust
2100 Law Enforcement Wiretaps: Background and Vulnerabilities Hack the Palate! How to Set Up a Kitchen Hack Lab
2200 Building a Hacker Space Virtual Private Servers and the (Free) Open Source PBX
2300 Everything You Ever Wanted to Know About Spying and Intelligence The New Engineers of Graffiti
Sunday, July 23 2006
Time Area A Area B
0900 Managing Your Company’s Intellectual Property: An Introduction to IT Security
1000 The Geeky, Personal, and Social Impact Sides of Creating Defensive Technology TrackSploits
1100 Urban Exploring: Hacking the Physical World Can Security Detectors Be Hacked?
1200 Basics of Forensic Recovery Privacy through Technology: A Hands-On
1300 Exploring Your World with Open Source GIS, GPS, and Google Maps Vulnerabilities in a Connected Future
1400 Social Engineering Ghosts (and Zombies) in the Machine
1500 Keynote Address Sunday: Jello Biafra The CryptoPhone Project
1600 Pseudonymous Software Development and Strong Distribution
1700 Underground Documentaries: The Art of the Interview and the Access Selfness-Copyfight: From Censorship to New Business Models
1800 The HOPE Net: What Worked and What Didn’t Comparison of WAN Routing Protocols
1900 HOPE Number Six Closing Ceremonies

Blogged with the Flock Browser

Tags: , , , ,


One thought on “Hacking the Mind: Hypnosis, NLP, and Shellcode

  1. Its like you read my thoughts! You seem to understand a lot approximately this, like you wrote the guide in it or something. I believe that you can do with a few percent to drive the message house a bit, however other than that, that is great blog. A fantastic read. I’ll certainly be back.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s