Low Tech Hacking

1st Edition

Street Smarts for Security Professionals

Print ISBN: 9781597496650
eBook ISBN: 9781597496667
Imprint: Syngress
Published Date: 19th December 2011
Page Count: 264
38.95 + applicable tax
30.99 + applicable tax
49.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

Key Features

  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture


Penetration Testers, Internal Auditors, Information Systems Auditors, CIOs, CISOs, Risk Managers, Fraud Investigators, System Administrators, Private Investigators, Ethical Hackers, Black Hat Hackers, Members of Local, State, and Federal Law Enforcement, Corporate Attorneys

Table of Contents



About the Authors


Chapter 1. Social engineering

Chapter 2. Low tech vulnerabilities

Chapter 3. More about locks and ways to low tech hack them

Chapter 4. Low tech wireless hacking

Chapter 5. Low tech targeting and surveillance

Chapter 6. Low tech hacking for the penetration tester

Chapter 7. Low tech hacking and the law

Chapter 8. Information security awareness training



No. of pages:
© Syngress 2012
eBook ISBN:
Paperback ISBN:


"In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack…Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker…The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing."--Security Management, February 2013 and other publications

"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus."--Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.

"Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' ‘war stories’ as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone."--Net-Security.org

"While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book,