| |
| |
Foreword | |
| |
| |
Introduction | |
| |
| |
| |
Dumpster Diving | |
| |
| |
Introduction to Dumpster Diving | |
| |
| |
| |
Tailgating | |
| |
| |
Introduction to Tailgating | |
| |
| |
Dressing the Part | |
| |
| |
Real-World Tailgating Exercise | |
| |
| |
| |
Shoulder Surfing | |
| |
| |
What is Shoulder Surfing? | |
| |
| |
Outside of the box | |
| |
| |
Great Locations for Should Surfing | |
| |
| |
Electronic Deduction | |
| |
| |
Killer Real-Life Surfing Sessions | |
| |
| |
Military Intelligence | |
| |
| |
Airliner Espionage | |
| |
| |
Robbing a Bank | |
| |
| |
Robbing Banks in Uganda, Africa | |
| |
| |
| |
Physical Security | |
| |
| |
Introduction | |
| |
| |
Lock Bumping | |
| |
| |
Shimming Padlocks (With Deviant Ollam) | |
| |
| |
Master Lock Combo Lock Brute Forcing | |
| |
| |
Toilet Paper vs. Tubular Locks | |
| |
| |
Electric Flossers: A Low-Tech Classic | |
| |
| |
Laptop Locks Defeated by Beer (With Matt Fiddler and Marc Weber Tobias) | |
| |
| |
TSA Locks (With Marc Weber Tobias) | |
| |
| |
Gun Trigger Locks vs. Drinking Straw (With Marc Tobias and Matt Fiddler) | |
| |
| |
Entry Techniques: Loiding (aka the Old Credit Card Trick) | |
| |
| |
Entry Techniques: Motion Sensor Activation | |
| |
| |
Bypassing Passive Infrared (PIR) Motion Sensors | |
| |
| |
Camera Flaring | |
| |
| |
Real World: Airport Restricted Area Simplex Lock Bypass | |
| |
| |
| |
Social Engineering: Here's How I Broke Into Their Buildings | |
| |
| |
Introduction | |
| |
| |
How Easy Is It? | |
| |
| |
Human Nature, Human Weakness | |
| |
| |
Hello? Is this thing on? | |
| |
| |
The Mind of a Victim | |
| |
| |
"Social engineering would never work against our company!" | |
| |
| |
What Was I Able to Social Engineer Out of Mary? | |
| |
| |
The Final Sting | |
| |
| |
Why did this scam work? | |
| |
| |
Countering Social Engineering Attacks | |
| |
| |
Be Willing To Ask Questions | |
| |
| |
Security Awareness Training | |
| |
| |
Posters | |
| |
| |
Videos | |
| |
| |
Certificates | |
| |
| |
| |
Google Hacking Showcase | |
| |
| |
Introduction to the Introduction | |
| |
| |
Introduction | |
| |
| |
Geek Stuff | |
| |
| |
Utilities | |
| |
| |
Open Network Devices | |
| |
| |
Open Applications | |
| |
| |
Cameras | |
| |
| |
Telco Gear | |
| |
| |
Power | |
| |
| |
Sensitive Info | |
| |
| |
Police Reports | |
| |
| |
Social Security Numbers | |
| |
| |
Credit Card Information | |
| |
| |
Beyond Google | |
| |
| |
Summary | |
| |
| |
| |
P2P Hacking | |
| |
| |
Understanding P2P Hacking | |
| |
| |
Real World P2P Hacking: The Case of the Naughty Chiropractor | |
| |
| |
| |
People Watching | |
| |
| |
How to "People Watch" | |
| |
| |
| |
Kiosks | |
| |
| |
Understanding Kiosk Hacking | |
| |
| |
Real World: ATM Hacking | |
| |
| |
| |
Vehicle Surveillance | |
| |
| |
How Easy Is Vehicle Surveillance? | |
| |
| |
| |
Badge Surveillance | |
| |
| |
Where Are Your Badges? | |
| |
| |
Electronic Badge Authentication | |
| |
| |
Real World Badge Surveillance | |
| |
| |
Epiloque Top Ten Ways to Shut Down No-Tech Hackers | |
| |
| |
Go Undercover | |
| |
| |
Shred Everything | |
| |
| |
Get Decent Locks | |
| |
| |
Put that Badge Away | |
| |
| |
Check Your Surveillance Gear | |
| |
| |
Shut Down Shoulder Surfers | |
| |
| |
Block Tailgaters | |
| |
| |
Clean your Car | |
| |
| |
Watch your Back Online | |
| |
| |
Beware of Social Engineers | |
| |
| |
Index | |