Part II. Putting Ethical Hacking in Motion
In this part . . .
Let the games begin! You've waited long enough â now's the time to start testing your systems. But where do you start? How about with your three Ps â your people, your physical systems, and your passwords? These are, after all, three of the most easily and commonly attacked targets in your organization.
This part starts with a discussion of hacking people (as opposed to hacking up people; this is social engineering, not The Texas Chainsaw Massacre). It then goes on to look at physical security vulnerabilities. Of course, I'd be remiss in a part about people if I skipped passwords, so I cover the technical details of testing those as well. This is a great way to get the ball rolling to warm you up for the more specific hacks later in the book.
Get Hacking For Dummies® 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.