No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
暫譯: 無技術駭客:社會工程、垃圾潛水與肩膀窺視指南

Johnny Long, Jack Wiles

  • 出版商: Syngress Media
  • 出版日期: 2008-02-01
  • 定價: $1,650
  • 售價: 5.0$825
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 1597492159
  • ISBN-13: 9781597492157
  • 相關分類: 駭客 Hack
  • 立即出貨 (庫存 < 3)

買這商品的人也買了...

相關主題

商品描述

As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.

As you browse this book, you'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?

. Dumpster Diving
Be a good sport and don't read the two "D" words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
. Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
. Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
. Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
. Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
. Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
. P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
. People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
. Kiosks
What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
. Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

商品描述(中文翻譯)

根據陳腔濫調所提醒我們的,資訊就是力量。在這個電腦系統和科技的時代,世界上越來越多的資訊以電子方式儲存。因此,作為一個行業,我們依賴高科技電子保護系統來保護這些資訊是合情合理的。作為一名專業駭客,我的工作是揭露這些系統的弱點並加以利用。無論是闖入建築物還是潛入工業級防火牆,我的目標始終如一:以任何必要的手段提取資訊秘密。經過數百次的工作,我發現了繞過所有可想像的高科技安全系統的秘密。本書揭示了這些秘密,正如書名所暗示的,這與高科技無關。事實上,這個秘密根本不算秘密。駭客們多年前就已經知道這些技術。以輕鬆易懂的風格呈現,您將與作者一起體驗成功的現實世界入侵,他們分享照片、影片和故事,證明高科技世界對於低科技攻擊的脆弱性。

在您瀏覽本書時,您會聽到一些熟悉的術語,如「垃圾桶潛水」、「社會工程」和「肩膀監視」。這些術語中的一些已經逐漸淹沒在歷史中,成為行業的民間傳說;是黎明前資訊時代的戰術。但不要誤會;這些以及其他老派戰術在今天仍然有效。事實上,您所在的組織中,有很大的機會會有人在今年成為這些攻擊的受害者。他們會準備好嗎?

. 垃圾桶潛水
做個好運動,不要閱讀上面用大字寫的兩個「D」字,當我告訴你駭客可以在不依賴任何技術的情況下完成這一點時,表現出驚訝(雙關語)。

. 尾隨
駭客和忍者都喜歡穿黑色,他們都擁有潛入建築物並與陰影融為一體的能力。

. 肩膀監視
如果您喜歡在筆記本電腦上有一個螢幕,以便查看您正在處理的內容,那麼請不要閱讀這一章。

. 實體安全
鎖具是嚴肅的事業,鎖匠技術人員是真正的工程師,大多數人擁有多年實務經驗。但當您將這個古老而受人尊敬的鎖匠職業與駭客的創意結合時,會發生什麼?

. 與 Jack Wiles 的社會工程
Jack 已經訓練了數百名聯邦特工、企業律師、CEO 和內部審計師,主題涉及電腦犯罪和安全相關的議題。他那令人難忘的演講充滿了三十年來在資訊安全和實體安全前線的個人「戰爭故事」。

. Google 駭客
駭客甚至不需要自己的電腦來進行必要的研究。如果他能到達公共圖書館、Kinko's 或網咖,他可以使用 Google 將所有數據處理成有用的資訊。

. P2P 駭客
假設一個人沒有預算,沒有商業駭客軟體,沒有組織犯罪的支持,也沒有華麗的設備。在這些限制下,這個人仍然對您構成威脅嗎?看看這一章,自己判斷。

. 觀察人群
熟練的觀察者可以在短短幾次快速的瞥見中學到很多。在這一章中,我們將看看一些吸引低科技駭客目光的事物的例子。

. 自助服務機
當自助服務機不僅僅是自助服務機時會發生什麼?當自助服務機持有航空乘客資訊時會發生什麼?如果自助服務機持有機密病人資訊呢?如果自助服務機持有現金呢?

. 車輛監視
大多數人並不知道,一些最驚險的車輛間諜活動發生在汽車完全不移動的時候!