No Tech Hacking and over 2 million other books are available for Amazon Kindle . Learn more


or
Sign in to turn on 1-Click ordering.
Trade in Yours
For a 1.43 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading No Tech Hacking on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing [Paperback]

Johnny Long
3.8 out of 5 stars  See all reviews (5 customer reviews)
RRP: 30.99
Price: 21.54 & FREE Delivery in the UK. Details
You Save: 9.45 (30%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it Tuesday, 22 April? Choose Express delivery at checkout. Details

Formats

Amazon Price New from Used from
Kindle Edition 17.12  
Paperback 21.54  
Trade In this Item for up to 1.43
Trade in No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing for an Amazon.co.uk gift card of up to 1.43, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

31 Mar 2008
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliche goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. Dumpster Diving - Be a good sport and don't read the two "D" words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. Shoulder Surfing - If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. Google Hacking - A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. . P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? Vehicle Surveillance - Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Frequently Bought Together

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing + Social Engineering: The Art of Human Hacking + The Art of Deception: Controlling the Human Element of Security
Price For All Three: 45.10

Buy the selected items together


Product details

  • Paperback: 480 pages
  • Publisher: Syngress; 1 edition (31 Mar 2008)
  • Language: English
  • ISBN-10: 1597492159
  • ISBN-13: 978-1597492157
  • Product Dimensions: 23.2 x 19.1 x 1.9 cm
  • Average Customer Review: 3.8 out of 5 stars  See all reviews (5 customer reviews)
  • Amazon Bestsellers Rank: 642,866 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, and more.

Product Description

About the Author

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills. Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?


Customer Reviews

Most Helpful Customer Reviews
3 of 3 people found the following review helpful
5.0 out of 5 stars A well presented book 21 April 2012
Format:Paperback|Verified Purchase
This is easy to read and full of ideas and I sight, even for people like me who are in that are of business. Very entertaining like his presentations on YouTube, which I also recommend
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
5.0 out of 5 stars An eye opener 23 May 2009
Format:Paperback
I think a lot of people could pass the book by just from looking at the title.

I bought this book around a year ago having suffered from having my personal email accounts etc hacked. I wish I had read this book before hand.

Anyone who has a presence on the Internet, from an email account to a blog should really try and read this book. We can buy security applications to protect ourselves from virii and mal-ware, we can buy security hardware to protect ourselves from Internet based attackers from getting into our systems - but what can we do to secure ourselves from people armed with coathangers and wet towels?

That last sentence isnt a joke, the book describes how a security system was breached with these items. It also discusses things that we dont really consider to be personal information and how to safe guard ourselves from ID scammers etc.

Its a very interesting book and I would recommend it to anyone from a normal person who has ever thought "is this secure?" to a security analyst. I also applaud the author for his very upfront manner and attitudes to this area in security
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
4.0 out of 5 stars A good primer 28 May 2010
Format:Paperback
For those people interested in seeing what it takes to be a physical penetration testers, then this, exceptionally easy to read and understand book, is the book for you. It is a simple, enthralling read which really does show you how simple it is to get into places where people don't want you to be.

The book takes you in simple steps through the sort of problems that you will encounter as a physical pen-tester: from getting in through the front door, to defeating door locks and other security systems, to bypassing security systems such as CCTV.
I am also heartened to see that the book does not simply concentrate on the "oh wow, gosh how cool is this" aspects of no-tech hacking, but also covers the ethical, moral and legal aspects of such operations; albeit from an US perspective - which to be fair to the author is his target audience. Those security experts working the UK might be better to look to Wil Allsopp's book "Unauthorised Access: Physical Penetration Testing for IT Security Teams".

I would advise any reader to take careful note of the author's musing on whether to disclose or not, when encountering security issues in the real world that are not part of your Rules of Engagement - they are very wise indeed.

The book is packed with little snippets and facts that will stop and make you pause for thought. For instance the section on how to defeat CCTV cameras really was an eye opener for me.
Read more ›
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
3.0 out of 5 stars Free ebook download 7 Oct 2010
Format:Kindle Edition
I purchased this for the price shown and was reasonable happy with
the content which I found to be quite entertaining

This book seems to be marked "free ebook download" on the cover
although I paid the full fee for the kindle edition?
Was this review helpful to you?
1 of 2 people found the following review helpful
2.0 out of 5 stars Disappointing 4 Aug 2010
Format:Paperback|Verified Purchase
This is a very basic book, and doesn't really cover much of what you'd believe from the title. At least half of the book is about very basic "Google hacking" - i.e. customising search terms to find things that are in the public domain that you aren't meant to see. The author even admits that "this is not no-tech hacking" - in other words, it's filler.

The small amount here devoted to social engineering is covered far better in Mitnick's "The Art of Deception".

If you're a 14-year-old interested in becoming an Elite Hacker, this might be a good place to start - but don't expect too much about, well, social engineering, dumpster diving, or shoulder surfing.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Search Customer Reviews
Only search this product's reviews
ARRAY(0xb514396c)

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback