• Tidak ada hasil yang ditemukan

Low Tech Hacking: Street Smarts for Security Professionalsen

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "Low Tech Hacking: Street Smarts for Security Professionalsen"

Copied!
265
0
0

Teks penuh

I would especially like to thank all the other authors and interviewed experts in this book. These are some of the most respected and talented security minds in the world and I am honored to have them share this incredible experience with me. Furthermore, we have neglected two of the most fundamental requirements for network security, which historically have always been proven to reduce the threat landscape—.

As the vast majority of reports, survey respondents used Anti-Virus, but the majority still reported problems with malware. If the vast majority of the reports, respondents of the survey used Firewalls, nevertheless reported problems with network intrusion. As the vast majority of reports, survey respondents used strong password policies but reported issues with unauthorized access.

Jennifer has more than 15 years of experience working in various areas of the technology industry. Sean worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the passage of the Gramm-Leach-Bliley Act.

Social engineering: The ultimate low tech hacking threat

Individuals, business owners and those responsible for managing security for themselves, their families and their businesses will benefit from this insight into the world of low-tech hacks, physical intrusion and social engineering, and the measures that can be taken to to prevent becoming a victim of such attacks. This book consists of eight chapters, each dealing with a different facet of low-tech hacking techniques and the countermeasures that accompany them. The chapters are written and assembled in a way that allows the reader to gain value by reading the book as a whole or by reading individual chapters in any chosen order.

There is a logical progression, starting with the opening chapter on Social Engineering: The Ultimate Low Tech Hacking Threat, followed by Low Tech Vulnerabilities: Physical Security, and More on Locks and Ways to Low Tech Hack TheminChapters 2and3.Chapters 4and beyond open up to broader low-tech topics hacking, with disciplines that integrate well to give readers a multi-pronged approach to dealing with low-tech hacks and hackers.

Low tech vulnerabilities: Physical security

More about locks and ways to low tech hack them

Low tech wireless hacking

Of the two cables in the center next to each other, the keyboard cable is the one on the right. Phil is one of the best in the world at helping people deal with those issues. Jack: You are considered by many to be one of the top security minds in the world.

Can you give us a few examples of some of the things you've seen. The threat of the world's bad guys using social engineering is most likely here to stay. Much of the information about these people (and possibly about you) was out on the Internet.

This is one of the most detailed books from Elsevier that I have ever seen on lock. The locks are designed to be difficult to remove from the unsecured side of the door. In the center of Figure 3.17 is one of the sets of depth switches from the box shown in Figure 3.16.

The key to the left of the pile, pointing straight down, is the zero cut key.

Figure 1.5 is a picture of me wearing a few of the tools that I picked up along the way from many of my favorite hunting grounds
Figure 1.5 is a picture of me wearing a few of the tools that I picked up along the way from many of my favorite hunting grounds

DoS attacks

This section is devoted to various low-tech hacking techniques for these popular wireless structures. Since we're dealing with a slightly more low-tech topic in this book than other low-tech hacks, I've decided to rate each hack on a scale of one to five, with five being the most technical of the low-tech hacks. This hack might require something as simple as aluminum foil, so it also gets a low tech level of 1.

When measuring we found that the RF signal took a hit, but not big enough to put my Low Tech Hack stamp of approval on Doctor Reflecto. For our second try, I still didn't get math with it - after all, this is supposed to be a low-tech hack, not an attack to get your calculator out and put the foil in the right way, right. If this didn't do it then I was ready to declare this Low Tech Hack Myth BUSTED.

After the test, we ended up with a whole pile of aluminum foil. Figure 4.13 shows a shot of the aftermath. In other low-tech hacking news, we came up with a simple yet effective way to launch a DoS attack on wireless through electrical tampering. This attack gets its own section, as we attack the electrical properties of the system instead of just an antenna.

This hack is worthy of a Low Tech Level 0.5, our lowest tech hack in the chapter. Each combination of AP and antenna will have a set output power based on the AP type, the configuration (power settings) and the measured gain of the antenna. Although this attack requires minimal technology to physically perform (an antenna modification), I give this hack a slightly higher Low Tech Level 2 since the attacker must be familiar with FCC regulations and acquire the illegal antenna to perform this attack.

To discuss these next low-tech hacks, we need to have a little background on some of the more basic nuances of the technology. For our low-tech hacks, the two easiest ways to set up wireless are by raising the noise floor of the wireless device and by exploiting the collision avoidance mechanism used by wireless. Our next low-tech hack explains how the half-duplex properties of RF can be exploited to launch a localized DoS attack.

Table 4.2 Sample Beamwidths for Common Antenna Types
Table 4.2 Sample Beamwidths for Common Antenna Types

DoS attacks

Low tech targeting and surveillance: How much could

Low tech hacking for the penetration tester

Low tech hacking and the law: Where can you go for help? 179

Information security awareness training: Your most

They can scream "go find an easier target" to the bad guys of the world. Embedded attacks are part of the low-tech hacking subgenre of wireless attacks. I'm giving this attack a Low Tech Level 5, the highest technical designation for low-tech hacks.

With this, the hacker has two options, depending on the culture of the IT staff. The IT staff just needs to be aware of the possibility and keep a better eye on the wireless network.

Gambar

Figure 1.5 is a picture of me wearing a few of the tools that I picked up along the way from many of my favorite hunting grounds
Figure 3.1 is a picture of the oldest pin tumbler lock that I own. On the bottom of the lock, there is a patent date of 1901
FIGURE 3.3 Warded padlock
Figure 3.11 shows it in the compromised position. That bolt is not securely locked open
+6

Referensi

Garis besar

Dokumen terkait

Correlation Analysis of Knowledge and Education Against the Implementation of Basic Life Support BHD in Patients of Cardiac Arrest by Nurses in Emergency Installation and ICU of