Index

Note: Page numbers followed by “f” and “t” refers to figures and tables respectively.

A

Abagnale, Frank, 11–12
Access, gaining
to business, 127
organized crime groups, 131
state-sponsored/terrorist groups, 130–131
trouble causers, hobbyists, and lone gunmen, 131–132
to underground bunker data center, 121–122
Active e-mail reconnaissance, 214
Active information gathering, 257–264
dumpster diving, 258–259
photography, 260–261
public access areas, 262–263
reception area, 261–262
rogue access points, 263–264
shoulder surfing, 259–260
Active spidering with OWASP Zed Attack Proxy, 160–163
Adafruit Pi Plate, 293–296
Advance fee fraud, 211
Alternative dropboxes, 304–306
3G and IP KVMs, 304–305
routers, 305
wireless access points, 306
American Express, ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.