No tech hacking a guide to social engineering, dumpster diving, and shoulder surfing

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that...

Descripción completa

Detalles Bibliográficos
Autor principal: Long, Johnny (-)
Otros Autores: Mitnick, Kevin D. (Kevin David), 1963-
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress c2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627525106719
Tabla de Contenidos:
  • Front Cover; No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing; Copyright Page; Johnny Long, Author; "I'm Johnny. I Hack Stuff."; Technical Editor; Contributing Author; Foreword Contributor; Special Contributors; Contents; Foreword; Introduction; What Is "No-Tech Hacking?"; Chapter 1: Dumpster Diving; Introduction to Dumpster Diving; Chapter 2: Tailgating; Introduction to Tailgating; Dressing the Part; Real-World Tailgating Exercise; Chapter 3: Shoulder Surfing; What is Shoulder Surfing?; Outside of the box; Great Locations for Should Surfing
  • Electronic DeductionKiller Real-Life Surfing Sessions; Military Intelligence; Airliner Espionage; Robbing a Bank; Robbing Banks in Uganda, Africa; Chapte 4: Physical Security; Introduction; Lock Bumping; Shimming Padlocks (With Deviant Ollam); Master Lock Combo Lock Brute Forcing; Toilet Paper vs. Tubular Locks; Electric Flossers: A Low-Tech Classic; Laptop Locks Defeated by Beer (With Matt Fiddler and Marc Weber Tobias); TSA Locks (With Marc Weber Tobias); Gun Trigger Locks vs. Drinking Straw (With Marc Tobias and Matt Fiddler); Entry Techniques: Loiding (aka the Old Credit Card Trick)
  • Entry Techniques: Motion Sensor ActivationBypassing Passive Infrared (PIR) Motion Sensors; Camera Flaring; Real World: Airport Restricted Area Simplex Lock Bypass; Cahpter 5: Social Engineering: Here's How I Broke Into Their Buildings; Introduction; How Easy Is It?; Human Nature, Human Weakness; Hello? Is this thing on?; The Mind of a Victim; ""Social engineering would never work against our company!""; What Was I Able to Social Engineer Out of Mary?; The Final Sting; Why did this scam work?; Countering Social Engineering Attacks; Be Willing To Ask Questions; Security Awareness Training
  • PostersVideos; Certificates; Chapter 6: Google Hacking Showcase; Introduction to the Introduction; Introduction; Geek Stuff; Utilities; Open Network Devices; Open Applications; Cameras; Telco Gear; Power; Sensitive Info; Police Reports; Social Security Numbers; Credit Card Information; Beyond Google; Summary; Chapter 7: P2P Hacking; Understanding P2P Hacking; Real World P2P Hacking: The Case of the Naughty Chiropractor; Chapter 8: People Watching; How to ""People Watch""; Chapter 9: Kiosks; Understanding Kiosk Hacking; Real World: ATM Hacking; Chapter 10: Vehicle Surveillance
  • How Easy Is Vehicle Surveillance?Chapter 11: Badge Surveillance; Where Are Your Badges?; Electronic Badge Authentication; Real World Badge Surveillance; Epiloque: Top Ten Ways to Shut Down No-Tech Hackers; Go Undercover; Shred Everything; Get Decent Locks; Put that Badge Away; Check Your Surveillance Gear; Shut Down Shoulder Surfers; Block Tailgaters; Clean your Car; Watch your Back Online; Beware of Social Engineers; Index