Originally subtitled A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, this book goes well beyond these techniques, letting you in on vehicle surveillance, peer-to-peer hacking, Google hacking, shoulder surfing, people watching, kiosk hacking and more. Whether you’re concerned about protecting you corporate network or guarding against identity theft, I’ve made sure that this book is easy-to-read, fun and informative without blowing your mind with technical jargon.
Machines don't fight wars. Terrain doesn't fight wars. Humans fight wars. You must get into the mind of humans. That's where the battles are won. - COL John R. Boyd
A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No-Tech hacking is all about showing how bad guys can defeat the best high-tech security systems without using technology. In most cases, we present completely no-tech attacks (some of which don’t even require that a bad guy touch anything) while in others we present simple, uncomplicated “low-tech” attacks that require hardly any technical skill. The book is jam-packed with photos of real-world attacks and examples from every day life. Seeing life through the eyes of myself and a few trusted friends, you’ll come to understand just how frighteningly gifted an attacker can be when he leverages the simple power of observation.
Originally subtitled A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, this book goes well beyond these techniques, letting you in on vehicle surveillance, peer-to-peer hacking, Google hacking, shoulder surfing, people watching, kiosk hacking and more. Whether you’re concerned about protecting you corporate network or guarding against identity theft, I’ve made sure that this book is easy-to-read, fun and informative without blowing your mind with technical jargon.
Originally subtitled A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, this book goes well beyond these techniques, letting you in on vehicle surveillance, peer-to-peer hacking, Google hacking, shoulder surfing, people watching, kiosk hacking and more. Whether you’re concerned about protecting you corporate network or guarding against identity theft, I’ve made sure that this book is easy-to-read, fun and informative without blowing your mind with technical jargon.