Introduction
—Jennifer (Jabbusch) Minella, CISSP
CISO, Infrastructure Security Specialist Carolina Advanced Digital, Inc.
INFORMATION IN THIS CHAPTER:
• Book Overview and Key Learning Points
• Book Audience
• How this Book is Organized

Book overview and key learning points

This book arms any reader with the knowledge of how security measures can often be bypassed in situations ranging from physical security to networked enterprise systems—all with minimal technology savvy on the part of the offender. And, although seven of the eight chapters here detail security evasion methods, the true value of the book is realized in the countermeasures provided for each of the attack scenarios detailed.
In a world of content that capitalizes on vulnerability, risk, and fear, this book cuts through the smoke and mirrors of complicated and improbable hi-tech hacks and gets to the heart of the most vulnerable and most-often exploited components of security—human nature, physical containment, and the Internet.
The chapters of this book provide a unique dive into low tech hacking techniques and ways to protect yourself, your business, and your family from them. Although each chapter stands on its own, in combination, the authors have provided an invaluable resource and a holistic approach to increasing security at your home and your office, for critical data, and against rogue Internet records.

Book audience

The information in this book will prove to be a valuable resource for all types of readers, including individuals, heads of households, small business owners, and even CISOs and directors of international enterprises. There's a little something for everyone in Low Tech Hacking, and even the most seasoned security professionals will find new nuggets of data and invaluable resources.
Security professionals will gain insight into areas of physical security and social engineering not previously explored in other books. These readers will benefit from detailed examples of security bypass techniques in the opening chapters and penetration testing coverage, from the more technical wireless discussions, as well as the recommendations for security awareness training from a seasoned professional. The more paranoid infosec professionals will enjoy the tips for finding and removing personal data online. All security-minded readers will appreciate the introduction Jack provides to two agents from the U.S. Secret Service and F.B.I., and the insight they offer in the interview sections.
Individuals, business owners, and those responsible for managing security of themselves, their families, and their businesses will benefit from this insight into the world of low tech hacks, physical intrusion and social engineering, and the measures that can be taken to prevent becoming a victim of such attacks. From understanding which padlocks to use for your kids’ lockers, how to shop for secure home locks, to recognizing a false phone technician, the breadth and depth of attacks and countermeasures is enlightening for all audiences.

How this book is organized

This book is comprised of eight chapters, each addressing a different facet of low tech hacking techniques and the countermeasures that accompany them. The chapters are written and assembled in a way that allows the reader to attain value from reading the book as a whole, or from reading individual chapters in any chosen order.
There is a logical progression, starting with the opening chapter on Social Engineering: The Ultimate Low Tech Hacking Threat, followed by Low Tech Vulnerabilities: Physical Security, and More About Locks and Ways to Low Tech Hack Them in Chapters 2 and 3. Chapters 4 and beyond open into broader topics of low tech hacking, with subject areas that integrate well to give readers a multi-part approach to deal with low tech hacks and hackers.

Chapter 1: Social engineering: The ultimate low tech hacking threat

Jack Wiles presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Jack shares several examples of true stories to help the reader understand how social engineering attacks happen in homes and businesses, and how to prevent them.
In this chapter, for the first time, Jack reveals the contents of his red team briefcase, never before shared with the public. In all the years of leading a red team to conduct physical penetration tests into corporations and federal facilities, Jack's team went undetected, a perfect record. The first three chapters of this book offer great insight from Jack's personal experience as to how they pulled it off.
The first three chapters, as well as Chapter 7 are authored by Jack Wiles, renowned physical security specialist, professional speaker, inside penetration team leader, author and lead author of Low Tech Hacking.

Chapter 2: Low tech vulnerabilities: Physical security

Jack delves into the realm of physical security and provides actionable recommendations for increasing security at home, office, and everywhere in between. In this chapter, you'll find a breadth of advice including signage and lighting recommendations, paper record and electronic drive destruction considerations, securing subterranean entries, identifying drop ceiling vulnerabilities, reviewing security tapes and logs, and even a discussion about being extra mindful of lunch-time discussions.

Chapter 3: More about locks and ways to low tech hack them

As an extension of physical security, locks and lock picking have become their own topic within security. Chapter 3 will prove to be a unique view into bypassing locks. Offering more fresh content in this chapter, Jack divulges, for the first time ever, a variety of ways to bypass or disable locks without picking them. Details on creating keys and key copies with, and without, a key machine are addressed, as well as insight into proper key control. Drawing from his years of experience as a bonded locksmith, Jack shares some startling truths about locks and lock mechanisms that everyone should be aware of.

Chapter 4: Low tech wireless hacking

Bringing a slightly more technical approach to low tech hacking, this chapter presents the reader with a variety of attacks and countermeasures for wireless technologies in the home and office. Here, Jennifer (Jabbusch) Minella offers more than 30 unique attacks, organized in five primary categories; denial of service and availability, backdoors and cracks, rogue exploits, default vulnerabilities, and attacks on specific security tools. Wireless ploys bestowed range from disrupting municipal Wi-Fi with an antenna attack to bypassing access control systems with simple spoofing attacks.

Chapter 5: Low tech targeting and surveillance: How much could they find out about you?

This chapter, authored by Terry Gudaitis, Ph.D., a former operations officer and behavioral profiler at the CIA, is a frightening look at the world of targeting and surveillance from a true professional. The information provided, the true stories shared, and the references to resources readily available online are enough to send any security professional or layman running for the no-tech hills. Have you ever wanted to find a deleted tweet, or gather information on an impending corporate merger? If so, this chapter is for you. Even the most tech-savvy readers will find some of Terry's material here poignant.

Chapter 6: Low tech hacking for the penetration tester

Russ Rogers takes several of the low tech hacking components from the other chapters in this book and combines them to orchestrate an assortment of blended-threat attacks. This chapter guides the reader through the nuances of human nature and how to use traits such as selective attention to aide in distraction techniques, and how low tech hackers capitalize on the six basic tendencies of human behavior. In his scenarios, Russ hashes through all the considerations of a planned attack; selecting a target, designating an attack location, factoring corporate culture of the target, and picking the right technology and tools to increase the attack effectiveness. The culmination of this chapter gives the reader an insider's view of a real attack on a company, executed during a corporate event in Las Vegas.

Chapter 7: Low tech hacking and the law: Where can you go for help?

As we near the end of the book, Jack brings the readers a little closer to the world of security and incident response by introducing two agents, one from the United States Secret Service (USSS) and one from the Federal Bureau of Investigation (FBI). The interview-style format gives the reader a unique insight into the thoughts and personalities of the people most able to help in the event of an incident that spans jurisdictions, states, or even countries. In this chapter Jack also incites the readers to investigate public-private collaborative organizations such as the USSS ECTF and the FBI InfraGard.

Chapter 8: Information security awareness training: Your most valuable countermeasure to employee risk

Sean Lowther describes ways to incorporate Security Awareness Training as one of your least expensive and most effective security countermeasures. Jack met Sean about 5 years ago at a security conference and immediately recognized Sean as a world-class leader in the development of security awareness programs for organizations of all sizes. Sean is well known for designing a remarkably effective enterprise-wide awareness program at Bank of America. His program received the highest rating from the bank's regulators, and was consistently rated world class by industry peer groups. Sean firmly believes the success of a security plan is achieved by involving each and every employee. This chapter outlines the processes, procedures, and materials needed to build and measure a successful awareness program, as well as tips and tricks to keep employees engaged and make security part of the company mindset.

Conclusion

Authoring a book with contributions and content from five people is an interesting undertaking, to say the least. The end result is certainly worth the added effort, and the greatest benefit of involving professionals with such disparate backgrounds is the resulting depth and breadth of insight. This book truly has a little bit of something for everyone. Regardless of how much, or how little, experience each reader has in information security, physical security and hacking techniques, resources like Low Tech Hacking serve to reinforce common practices and introduce new nuggets of ideas, tools, and concepts that help us all continue learning and growing.
You can find out more about our authors and the book itself on http://www.LowTechHacking.com as well as by joining our LowTechHacking LinkedIn Group on www.LinkedIn.com.
Stay safe out there!
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.248.149