How I Rob Banks (eBook)

And Other Such Places

(Autor)

eBook Download: EPUB
2023 | 1. Auflage
196 Seiten
John Wiley & Sons (Verlag)
978-1-119-91151-7 (ISBN)

Lese- und Medienproben

How I Rob Banks - FC Barker
Systemvoraussetzungen
16,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Follow FC as he steals from the world's most secure banks and government facilities--without breaking a single law

In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.

The author explains how banks and other secure facilities operate, both digitally and physically, and shows you the tools and techniques he uses to gain access to some of the world's most locked-down buildings. You'll also find:

* Strategies you can implement immediately to better secure your own company, home, and data against malicious actors

* Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained inside

* An inside and candid look at a rarely examined industry through the eyes of one of its most respected penetration testers

A can't-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean's 11-style story pulled straight from the real world.

FC is a renowned ethical hacker and social engineer with over 20 years' experience working in the field of information security. He has worked for major high street banks in the UK and Europe, FTSE100 companies, several government agencies, and security forces. He's a frequent speaker at corporate events, security conferences, universities, and schools around the world.

Foreword xv

Introduction xvii

Chapter 1: What Is Social Engineering? 1

Chapter 2: 330 Cameras 4

Chapter 3: Expensive Doesn't Mean Secure 7

Chapter 4: The Trolley Problem 12

Chapter 5: High (Street) Security 17

Chapter 6: The Psychology of Stairs 19

Chapter 7: The Broken Arm Ruse 21

Chapter 8: Crown Jewels Are Not Always Shiny 24

Chapter 9: This Is My Office Now 27

Chapter 10: How to Use a Pen to Hack Any Door 31

Chapter 11: My First Kidnapping 34

Chapter 12: I Needed a New Computer 40

Chapter 13: Building My Own Office 43

Chapter 14: Letter of Authority 47

Chapter 15: Astute Manager 49

Chapter 16: I Can't Fly a Helicopter 51

Chapter 17: Doppelgangers Exist 54

Chapter 18: Stealing the Keychain 56

Chapter 19: It's Dangerous to Go Alone. Take This! 59

Chapter 20: The Gold Bar 63

Chapter 21: Plush Carpets 68

Chapter 22: Clean(er) Access 71

Chapter 23: What We Do in the Shadows 73

Chapter 24: What Do I Know about Diamonds? 77

Chapter 25: How to Crack a Safe 80

Chapter 26: Find a Safe Space 88

Chapter 27: Well, That Was Unexpected 92

Chapter 28: Opening a Door on Security 95

Chapter 29: How to Tailgate an Opaque Door 98

Chapter 30: The Guard Who Was Too Polite 100

Chapter 31: The Swan Effect 102

Chapter 32: What's in the Box? 105

Chapter 33: How to Bypass an Elevator Security System 107

Chapter 34: The Loading Bay 109

Chapter 35: The Escort 111

Chapter 36: The Staircase 114

Chapter 37: How to Bypass PIR Detectors 116

Chapter 38: ATMs 121

Chapter 39: Open Windows 124

Chapter 40: Security on a String Budget 127

Chapter 41: How to Bypass Padlocks 131

Chapter 42: Padlocked Gates 134

Chapter 43: The Security of Glass 138

Chapter 44: Trading Places 142

Chapter 45: How to Bypass Keypads 145

Chapter 46: E- Waste 148

Chapter 47: Fourteen Desktop PCs 151

Chapter 48: Spy Gadgets 155

Chapter 49: How to Steal Fingerprints 158

Chapter 50: Five Banks a Week 162

Chapter 51: Finding Out Too Much 165

Chapter 52: Needle in a Haystack 168

Chapter 53: Stealing a Purse and Keys 172

Chapter 54: How to Pick Locks 174

Chapter 55: The Porn Cupboard 179

Chapter 56: The Apartment Across the Way 182

Chapter 57: Magazine Shoot 186

Chapter 58: Double Trouble 189

Chapter 59: Fake ID 191

Chapter 60: Impersonation 195

Chapter 61: How Maglocks Work 199

Chapter 62: Personal Escort 202

Chapter 63: My Favorite Door 205

Chapter 64: Microwave Fences 208

Chapter 65: Discarded Passes 211

Chapter 66: Bypassing Speed Lanes 214

Chapter 67: The Case of the Angry Man 217

Chapter 68: Let's Play Doctors 220

Chapter 69: That's for Me! 225

Chapter 70: How to Use a Snickers Bar 231

Chapter 71: Taking the Bus to Work 233

Erscheint lt. Verlag 27.4.2023
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • Informatik • Networking / Security • Netzwerke / Sicherheit • Netzwerksicherheit
ISBN-10 1-119-91151-6 / 1119911516
ISBN-13 978-1-119-91151-7 / 9781119911517
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 39,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19