Preface |
|
xi | |
Acknowledgements |
|
xv | |
Foreword |
|
xvii | |
|
The Basics of Physical Penetration Testing |
|
|
1 | (10) |
|
What Do Penetration Testers Do? |
|
|
2 | (1) |
|
Security Testing in the Real World |
|
|
2 | (2) |
|
Legal and Procedural Issues |
|
|
4 | (4) |
|
|
8 | (1) |
|
Engaging a Penetration Testing Team |
|
|
9 | (1) |
|
|
10 | (1) |
|
Planning Your Physical Penetration Tests |
|
|
11 | (18) |
|
Building the Operating Team |
|
|
12 | (3) |
|
Project Planning and Workflow |
|
|
15 | (11) |
|
Codes, Call Signs and Communication |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (22) |
|
Common Paradigms for Conducting Tests |
|
|
30 | (1) |
|
Conducting Site Exploration |
|
|
31 | (3) |
|
Example Tactical Approaches |
|
|
34 | (2) |
|
Mechanisms of Physical Security |
|
|
36 | (14) |
|
|
50 | (1) |
|
An Introduction to Social Engineering Techniques |
|
|
51 | (16) |
|
Introduction to Guerilla Psychology |
|
|
53 | (8) |
|
Tactical Approaches to Social Engineering |
|
|
61 | (5) |
|
|
66 | (1) |
|
|
67 | (22) |
|
|
68 | (4) |
|
Introduction to Lock Picking |
|
|
72 | (8) |
|
|
80 | (2) |
|
Attacking Other Mechanisms |
|
|
82 | (4) |
|
|
86 | (3) |
|
|
89 | (32) |
|
|
90 | (9) |
|
|
99 | (3) |
|
Collecting Photographic Intelligence |
|
|
102 | (5) |
|
Finding Information From Public Sources and the Internet |
|
|
107 | (8) |
|
|
115 | (2) |
|
|
117 | (2) |
|
|
119 | (2) |
|
Hacking Wireless Equipment |
|
|
121 | (34) |
|
Wireless Networking Concepts |
|
|
122 | (3) |
|
Introduction to Wireless Cryptography |
|
|
125 | (6) |
|
|
131 | (13) |
|
Attacking a Wireless Client |
|
|
144 | (6) |
|
Mounting a Bluetooth Attack |
|
|
150 | (3) |
|
|
153 | (2) |
|
Gathering the Right Equipment |
|
|
155 | (22) |
|
The ``Get of Jail Free'' Card |
|
|
155 | (2) |
|
Photography and Surveillance Equipment |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (5) |
|
Global Positioning Systems |
|
|
165 | (2) |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (4) |
|
|
175 | (2) |
|
Tales from the Front Line |
|
|
177 | (30) |
|
|
177 | (10) |
|
|
187 | (10) |
|
|
197 | (7) |
|
|
204 | (3) |
|
Introducing Security Policy Concepts |
|
|
207 | (22) |
|
|
206 | (7) |
|
Protectively Marked or Classified GDI Material |
|
|
213 | (3) |
|
Protective Markings in the Corporate World |
|
|
216 | (2) |
|
|
218 | (3) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
Incident Response Policies |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
229 | (20) |
|
Understanding the Sources of Information Exposure |
|
|
230 | (5) |
|
Social Engineering Attacks |
|
|
235 | (4) |
|
Protecting Against Electronic Monitoring |
|
|
239 | (1) |
|
|
240 | (1) |
|
Protecting Against Tailgating and Shoulder Surfing |
|
|
241 | (1) |
|
Performing Penetration Testing |
|
|
242 | (3) |
|
Baseline Physical Security |
|
|
245 | (2) |
|
|
247 | (2) |
|
|
249 | (6) |
|
|
249 | (2) |
|
|
251 | (1) |
|
Regulation of Investigatory Powers Act |
|
|
252 | (1) |
|
|
253 | (2) |
|
|
255 | (6) |
|
Computer Fraud and Abuse Act |
|
|
255 | (1) |
|
Electronic Communications Privacy Act |
|
|
256 | (1) |
|
|
257 | (4) |
|
|
261 | (4) |
|
European Network and Information Security Agency |
|
|
261 | (2) |
|
Data Protection Directive |
|
|
263 | (2) |
|
Appendix D: Security Clearances |
|
|
265 | (6) |
|
Clearance Procedures in the United Kingdom |
|
|
266 | (1) |
|
Levels of Clearance in the United Kingdom |
|
|
266 | (2) |
|
Levels of Clearance in the United States |
|
|
268 | (3) |
|
Appendix E: Security Accreditations |
|
|
271 | (6) |
|
Certified Information Systems Security Professional |
|
|
271 | (1) |
|
Communication-Electronics Security Group Check |
|
|
272 | (2) |
|
Global Information Assurance Certification |
|
|
274 | (1) |
|
INFOSEC Assessment and Evaluation |
|
|
275 | (2) |
Index |
|
277 | |