No Tech Hacking

A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Series Editor:

  • Kevin Mitnick, Technical Editor, Hacker, best-selling author of The Art of Deception, U.S.A.

By

  • Johnny Long, A Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author who lurks at his website (http://johnny.ihackstuff.com) and is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need them
  • Johnny Long, A Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author who lurks at his website (http://johnny.ihackstuff.com) and is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need them

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.
View full description

Audience

Security specialists in the physical and IT security fields will find this invaluable. Full of real-world examples, it is suitable as a training manual for new employee awareness.

 

Book information

  • Published: February 2008
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-215-7


Table of Contents

Chapter 1: Reading People Chapter 2: Social Engineering Chapter 3: Shoulder SurfingChapter 4: Dumpster DivingChapter 5: Physical SecurityChapter 6: Death of a Road WarriorChapter 7: Google and P2P HackingChapter 8: Anatomy of a Break-In