Chapter 6. Low tech hacking for the penetration tester
Information in this chapter
• The Human Condition
• Technology Matters
• Staging the Effort
• Getting Things in Order
• A Useful Case Study
The chapters thus far have focused on physical security, social engineering, and surveillance, topics that are important to those who are working from the perspective of someone who is physically present at the location in question. This chapter takes a different approach and focuses on low-tech hacks for penetration testers, combining social engineering concepts with easy-to-use technology to create valid and effective attack techniques. To most penetration testers the end user is the weakest link in any information security chain; to organizations, this means ...
Get Low Tech Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.