Unauthorised Access: Physical Penetration Testing For IT Security Teams

Rating: 
Amazon Price: $50.00 $25.43 You save: $24.57 (49%). (as of December 14, 2017 01:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Continue reading “Unauthorised Access: Physical Penetration Testing For IT Security Teams”

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access

With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Price: $16.95

Click here to buy from Amazon

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker

Amazon Price: $17.00 $13.47 You save: $3.53 (21%). (as of December 13, 2017 22:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies–and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI's net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.
Continue reading “Ghost in the Wires: My Adventures as the World's Most Wanted Hacker”

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker

Ghost in the Wires: My Adventures as the World's Most Wanted HackerKevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies–and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Driven by a powerful urge to accomplish the impossible, Mitnick bypassed security systems and blazed into major organizations including Motorola, Sun Microsystems, and Pacific Bell. But as the FBI‘s net began to tighten, Kevin went on the run, engaging in an increasingly sophisticated cat and mouse game that led through false identities, a host of cities, plenty of close shaves, and an ultimate showdown with the Feds, who would stop at nothing to bring him down.

Ghost in the Wiresis a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information.

Price: $25.99

Click here to buy from Amazon

Die Kunst der Täuschung.

Die Kunst der TäuschungIn Die Kunst der Täuschungdreht sich alles um die Möglichkeit, jemandes Vertrauen mit Lügen zu erschleichen, um dieses Vertrauen dann zum eigenen Spaß und Vorteil zu missbrauchen. Hacker beschönigen dieses Vorgehen mit der Bezeichnung “soziales hacken” und der wohl bekannteste Hacker, Kevin Mitnick, analysiert in seinem Buch diese Technik mit zahlreichen Beispielszenarien.

Schon die ersten Dutzend Beispiele eignen sich, Sicherheitsbeauftragten von Unternehmen jede Lebenslust zu nehmen. Oft behauptet und mit diesem Buch erneut bestätigt: Menschliches Verhalten und die Sicherheitsvorkehrungen widersprechen sich grundsätzlich. Unternehmen sind dazu da, ein Produkt oder einen Service anzubieten und sind dabei auf freundliche und hilfsbereite Mitarbeiter angewiesen, um die Produkte oder Services an Frau und Mann zu bringen. Menschen sind sozial orientierte Tiere und brauchen Zuneigung und Anerkennung. Die menschliche Seite der Unternehmenssicherheit kontrollieren zu wollen, bedeutet, jemandem etwas vorzuenthalten. Das ist gleichbedeutend mit der versuchten Quadratur des Kreises.

Angesichts Mitnicks Ruf als Hacker-Guru ist bei einem Angriff der kleinste gemeinsame Nenner für Hacker, die sich der Sozialmanipulation bedienen, der Computer. Die meisten Szenarien in Die Kunst der Täuschung funktionieren ebenso bei computerfreien Organisationen und waren wahrscheinlich schon den Phöniziern bekannt. Die heutige Technik macht es jedoch schlichtweg einfacher. Telefonieren ist schneller als Briefe schreiben und große Organisationen sind gleichbedeutend mit vielen organisationsfremden Kontakten.

Viele der von Mitnick vorgeschlagenen Sicherheitstipps hören sich erst sinnvoll an, bis man darüber nachdenkt, wie man sie denn praktisch umsetzen kann. Denn dann fällt auf, dass wirkungsvollere Sicherheitsvorkehrungen gleichzeitig die Effizienz einer Organisation reduziert. Eine Gleichung, die in der konkurrenzbasierten Wirtschaft nicht aufgeht. Ganz abgesehen davon, dass niemand in einer Organisation arbeiten will, in der das oberste Gesetz “Traue niemandem” heißt. Mitnick zeigt auf, wie leicht Sicherheitsvorkehrungen durch Vertrauen aufs Spiel gesetzt werden. Ohne Vertrauen können Menschen jedoch nicht zusammenleben und -arbeiten. In der Realität müssen sich effektiv arbeitende Organisationen damit abfinden, dass absolute Sicherheit ein Mythos ist und nur bessere Versicherungen einen Ausweg aus dem Dilemma darstellen. –Steve Patient

Price:

Click here to buy from Amazon