Chapter 9. Tales from the Front Line

This chapter contains some examples of testing that I've performed that contain an element of physical penetration testing. The stories themselves, although based on real events, are fictionalized for obvious reasons. People tend to get upset when you publish details of how they were compromised. I have changed not only client names but also software and hardware details and locations. Not detailing these issues means that I don't get sued and neither does my publisher (which we mutually agreed was for the best). That being said, the concepts and themes in this chapter should be clear and should illustrate some of the points I've made throughout the book.

Get Unauthorised Access: Physical Penetration Testing For IT Security Teams now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.