Chapter 6. Low tech hacking for the penetration tester
Information in this chapter
• Getting Things in Order
The chapters thus far have focused on physical security, social engineering, and surveillance, topics that are important to those who are working from the perspective of someone who is physically present at the location in question. This chapter takes a different approach and focuses on low-tech hacks for penetration testers, combining social engineering concepts with easy-to-use technology to create valid and effective attack techniques. To most penetration testers the end user is the weakest link in any information security chain; to organizations, this means ...