Low tech hacking: street smarts for security professionals
Saved in:
Format: | Book |
---|---|
Language: | English |
Published: |
Amsterdam [u.a.]
Elsevier Syngress
2012
|
Subjects: | |
Online Access: | Inhaltsverzeichnis Inhaltsverzeichnis |
Item Description: | Literaturangaben |
Physical Description: | XIX, 243 S. Ill., graph. Darst. 24 cm |
ISBN: | 9781597496650 1597496650 |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040461997 | ||
003 | DE-604 | ||
005 | 20121115 | ||
007 | t| | ||
008 | 121009s2012 xx ad|| |||| 00||| eng d | ||
020 | |a 9781597496650 |9 978-1-59749-665-0 | ||
020 | |a 1597496650 |c pbk £30.99 |9 1-59749-665-0 | ||
035 | |a (OCoLC)815946723 | ||
035 | |a (DE-599)OBVAC08917099 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Low tech hacking |b street smarts for security professionals |c Jack Wiles ... |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier Syngress |c 2012 | |
300 | |a XIX, 243 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
653 | |a Computer security. | ||
653 | |a Computer crimes--Prevention. | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 2 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Wiles, Jack |e Sonstige |4 oth | |
856 | 4 | 2 | |m V:AT-OBV;B:AT-UBTUW |q application/pdf |u http://media.obvsg.at/AC08917099-1001 |x TUW |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025309422&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025309422 |
Record in the Search Index
_version_ | 1825766764403752960 |
---|---|
adam_text |
Contents
Acknowledgments
. ix
Foreword
. xi
About the Authors
. xiii
Introduction
. xv
CHAPTER
1
Social engineering: The ultimate low tech hacking threat
. 1
How easy is it?
. 2
The mind of a social engineer
. 3
The mind of a victim
. 3
Tools of the social engineering trade
. 4
One of my favorite tools of the trade
. 5
Social engineering would never work against our company
. 7
What was I able to social engineer out of Mary?
. 8
The final sting
—
two weeks later
—
Friday afternoon
. 8
Why did this scam work?
. 9
Let's look at a few more social
engineering
tools
. 10
Keystroke logger
—
Is there one under your desk?
. 13
One of my lunchtime tools
. 16
Let's look at that telephone butt-in set on my tool belt
. 18
Meet Mr. Phil Drake
. 19
Meet Mr. Paul Henry
. 22
Traditional AV, IDS, and IPS considerations
. 25
Traditional firewall consideration
. 25
Flaw remediation
. 26
Do you have a guest user of your credit card?
. 26
A few possible countermeasures
. 27
Always be slightly suspicious
. 28
Start to study the art of social engineering
. 28
Start a social
engineering
book library
. 28
Summary
. 29
CHAPTER
2
Low tech vulnerabilities: Physical security
. 31
A mini risk assessment
. 32
What did I have at risk?
. 32
What were some possible threats while out on the lake?
. 33
What were some of the possible vulnerabilities?
. 33
And finally, what about my countermeasures?
. 34
lit
iv Contents
Outsider—Insider
threats
. 34
Some things to consider for the security of your buildings?
. 35
Check all locks for proper operation
. 35
Use employee badges
. 36
Shredder technology keeps changing as well
. 36
Keep an eye on corporate or agency phone books
. 37
Unsecured areas are targets for tailgating
. 38
Special training for off-shift staff
. 39
Bomb threats in Chicago
. 40
Check those phone closets
. 42
Remove a few door signs
. 42
Review video security logs
. 43
Consider adding motion-sensing lights
. 43
Subterranean vulnerabilities
. 44
Clean out your elephant burial ground
. 46
Spot check those drop ceilings
. 47
Internal auditors are your friends
. 47
BONUS: Home security tips
. 48
Summary
. 49
CHAPTER
3
More about locks and ways to low tech hack them
. 51
A little more about locks and lock picking
. 52
What kinds of locks are the most popular?
. 54
Purchasing better quality locks will be cost effective
. 57
Be aware of lock vulnerabilities
. 58
Forced entry
—
and other ways to cheat!
. 60
A time-tested low tech method of forced entry
. 61
Let's break into
a semi-łigh
security room
. 63
Retracting the bolt to open the door
. 64
Gaining access to the lock itself
. 66
Keys and key control
. 70
Social engineering and key access
. 70
Who has the keys to your kingdom
. 70
Special key control awareness training
. 71
Bait and switch war story that could happen to you
. 71
Padlock shims are not a new threat
. 73
Some places to go to learn and have some fun
. 74
My llO-year-old puzzle
. 75
More about keys and how to make one if you
don't have one
_. 76
Rve
pounds of nly favorite keys
. 77
Ways to make a key if you didn't bring a key machine
. 79
Contents
One final
lock to talk about and then we're done
. 81
Rim cylinder locks vs. mortise cylinder locks
. 83
Summary
. 85
CHAPTER
4
Low tech wireless hacking
. 87
Wireless
101:
The electromagnetic spectrum
. 87
Why securing wireless is hard
. 90
802.11
and Bluetooth low tech hacks
. 91
DoS and availability
. 91
Layer
1
DoS attacks
. 91
Layer
2
DoS attacks
. 104
Backdoors and cracks
. 112
Crack attack
. 112
Tap, tap. Mirror, mirror
.
on the wallplate
. 115
Guesssst who got in
. 116
Peer-to-peer-to-hack
. 117
Ad hoc, ad
finem
. 119
Going rogue
. 120
Marveling at the gambit of rogues
. 121
New SSID on the street
. 122
It's a bird
.
it's a plane
.
it's a ROGUE?
. 124
Bridge bereavement
. 125
Assault by defaults
. 126
Open sesame
. 127
Default WPA keys
. 127
More Google hacking
. 129
Bypassing specific security tools
. 130
Going static
. 131
Counterfeit MACs
. 132
MAC switcharoo
. 133
<html>Free Wi-Fi</html>
. 134
Summary
. 134
CHAPTER
5
Low tech targeting and surveillance: How much could
they find out about you?
. 137
Initial identification
. 139
Property records, employment, and neighborhood routes
. 142
Disclosure on social networks and social media
. 144
Financiais,
investments, and purchase habits
. 146
Frequented locations and travel patterns
. 149
Third party disclosures
. 152
Use of signatures
. 154
VI
Contents
Automated surveillance
. 155
Target interaction
. 156
Scanners and miniatures
. 158
Summary and recommendations
. 159
Recommendations
. 160
CHAPTER
6
Low tech hacking for the penetration tester
. 163
The human condition
. 164
Selective attention
. 164
Magic is distraction
. 165
Building trust and influencing behavior
. 166
Technology matters
. 166
USB thumb drives
. 166
CDs and DVDs
. 168
Staging the effort
. 169
Target organization
. 169
Getting things in order
. 170
Deciding on location
. 171
Choosing the strategy
. 171
Choosing the technology
. 172
A useful case study
. 174
Approaching hotel staff
. 175
Approaching conference staff
. 176
Conclusion
. 176
Summary
. 177
CHAPTER
7
Low tech hacking and the law: Where can you go for help?
179
Meet Mr. Tony Marino
. 180
Low tech hacking interview with Tony Marino,
U.S. Secret Service (retired)
. 180
Meet Special Agent
(SA)
Gregory K. Baker, FBI
. 187
Low tech hacking interview with Special Agent
(SA)
Gregory K. Baker, FBI
. 187
Summary
. 191
CHAPTER
8
Information security awareness training: Your most
valuable countermeasure to employee risk
_. 193
An introduction to information security awareness
. 194
The people and personalities of information security
awareness
.„. 194
Contents
vii
Data
theft and employee awareness
. 196
Designing an effective information security awareness
program
. 198
Repetition is the aide to memory
. 199
Touch points
. 199
To team or not to team, that is the question
. 200
Creating a business plan for your Information Security
Awareness Program
. 201
The presentation
. 202
Components of an awareness program
. 204
Next steps
. 205
The Classification of Data Matrix
. 205
Manager's Quick Reference Guide
. 206
Finding materials for your program
. 207
The importance of a good editor
. 207
Implementing an information security awareness program
. 207
Who writes the awareness standard?
. 209
Finding win-win solutions
. 210
Building a perpetual awareness program
. 210
Who should take the training?
. 211
Getting the program off the ground
. 211
Making information security accessible
. 212
A lesson learned
. 212
The dollars and cents of your program
. 213
Above and beyond
. 214
Making security part of the company mind-set
. 216
The importance of communication with other
lines-of-businesses
. 216
Let's talk more about alliances
. 217
Keeping your program viable
. 220
Other resources
. 220
Measuring your program's success
. 221
Identifying key components and cumulative results
. 222
Summary
. 223
Index
. 227 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040461997 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)815946723 (DE-599)OBVAC08917099 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV040461997</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121115</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121009s2012 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496650</subfield><subfield code="9">978-1-59749-665-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496650</subfield><subfield code="c">pbk £30.99</subfield><subfield code="9">1-59749-665-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815946723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC08917099</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Low tech hacking</subfield><subfield code="b">street smarts for security professionals</subfield><subfield code="c">Jack Wiles ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 243 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer crimes--Prevention.</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wiles, Jack</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">V:AT-OBV;B:AT-UBTUW</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://media.obvsg.at/AC08917099-1001</subfield><subfield code="x">TUW</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025309422&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025309422</subfield></datafield></record></collection> |
id | DE-604.BV040461997 |
illustrated | Illustrated |
indexdate | 2025-03-05T15:01:10Z |
institution | BVB |
isbn | 9781597496650 1597496650 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025309422 |
oclc_num | 815946723 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XIX, 243 S. Ill., graph. Darst. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Elsevier Syngress |
record_format | marc |
spelling | Low tech hacking street smarts for security professionals Jack Wiles ... Amsterdam [u.a.] Elsevier Syngress 2012 XIX, 243 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Literaturangaben Prävention (DE-588)4076308-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computer security. Computer crimes--Prevention. Computersicherheit (DE-588)4274324-2 s Computerkriminalität (DE-588)4010452-7 s Prävention (DE-588)4076308-0 s DE-604 Wiles, Jack Sonstige oth V:AT-OBV;B:AT-UBTUW application/pdf http://media.obvsg.at/AC08917099-1001 TUW Inhaltsverzeichnis Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025309422&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Low tech hacking street smarts for security professionals Prävention (DE-588)4076308-0 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4076308-0 (DE-588)4274324-2 (DE-588)4010452-7 |
title | Low tech hacking street smarts for security professionals |
title_auth | Low tech hacking street smarts for security professionals |
title_exact_search | Low tech hacking street smarts for security professionals |
title_full | Low tech hacking street smarts for security professionals Jack Wiles ... |
title_fullStr | Low tech hacking street smarts for security professionals Jack Wiles ... |
title_full_unstemmed | Low tech hacking street smarts for security professionals Jack Wiles ... |
title_short | Low tech hacking |
title_sort | low tech hacking street smarts for security professionals |
title_sub | street smarts for security professionals |
topic | Prävention (DE-588)4076308-0 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Prävention Computersicherheit Computerkriminalität |
url | http://media.obvsg.at/AC08917099-1001 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025309422&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wilesjack lowtechhackingstreetsmartsforsecurityprofessionals |
There is no print copy available.
Indexes