Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Preface
Who this Book Is For
What this Book Covers
How this Book Is Structured
What You Need to Use this Book
Acknowledgements
Foreword
Chapter 1 - The Basics of Physical Penetration Testing
What Do Penetration Testers Do?
Security Testing in the Real World
Legal and Procedural Issues
Know the Enemy
Engaging a Penetration Testing Team
Summary
Chapter 2 - Planning Your Physical Penetration Tests
Building the Operating Team
Project Planning and Workflow
Codes, Call Signs and Communication
Summary
Chapter 3 - Executing Tests
Common Paradigms for Conducting Tests
Conducting Site Exploration
Example Tactical Approaches
Mechanisms of Physical Security
Summary
Chapter 4 - An Introduction to Social Engineering Techniques
Introduction to Guerilla Psychology
Tactical Approaches to Social Engineering
Summary
Chapter 5 - Lock Picking
Lock Picking as a Hobby
Introduction to Lock Picking
Advanced Techniques
Attacking Other Mechanisms
Summary
Chapter 6 - Information Gathering
Dumpster Diving
Shoulder Surfing
Collecting Photographic Intelligence
Finding Information From Public Sources and the Internet
Electronic Surveillance
Covert Surveillance
Summary
Chapter 7 - Hacking Wireless Equipment
Wireless Networking Concepts
Introduction to Wireless Cryptography
Cracking Encryption
Attacking a Wireless Client
Mounting a Bluetooth Attack
Summary
Chapter 8 - Gathering the Right Equipment
The “Get of Jail Free” Card
Photography and Surveillance Equipment
Computer Equipment
Wireless Equipment
Global Positioning Systems
Lock Picking Tools
Forensics Equipment
Communications Equipment
Scanners
Summary
Chapter 9 - Tales from the Front Line
SCADA Raiders
Night Vision
Unauthorized Access
Summary
Chapter 10 - Introducing Security Policy Concepts
Physical Security
Protectively Marked or Classified GDI Material
Protective Markings in the Corporate World
Communications Security
Staff Background Checks
Data Destruction
Data Encryption
Outsourcing Risks
Incident Response Policies
Summary
Chapter 11 - Counter Intelligence
Understanding the Sources of Information Exposure
Social Engineering Attacks
Protecting Against Electronic Monitoring
Securing Refuse
Protecting Against Tailgating and Shoulder Surfing
Performing Penetration Testing
Baseline Physical Security
Summary
Appendix A - UK Law
Appendix B - US Law
Appendix C - EU Law
Appendix D - Security Clearances
Appendix E - Security Accreditations
Index
← Prev
Back
Next →
← Prev
Back
Next →