O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Note: Page numbers followed by “f” and “t” refers to figures and tables respectively.

A

Abagnale, Frank, 11–12
Access, gaining
to business, 127
organized crime groups, 131
state-sponsored/terrorist groups, 130–131
trouble causers, hobbyists, and lone gunmen, 131–132
to underground bunker data center, 121–122
Active e-mail reconnaissance, 214
Active information gathering, 257–264
dumpster diving, 258–259
photography, 260–261
public access areas, 262–263
reception area, 261–262
rogue access points, 263–264
shoulder surfing, 259–260
Active spidering with OWASP Zed Attack Proxy, 160–163
Adafruit Pi Plate, 293–296
Advance fee fraud, 211
Alternative dropboxes, 304–306
3G and IP KVMs, 304–305
routers, 305
wireless access points, 306
American Express, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required