Facebook Pixel
Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
No Tech Hacking

No Tech Hacking

A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by Johnny Long 2008 384 pages
3.94
100+ ratings
Listen

Key Takeaways

1. No-tech hacking exploits human nature and observational skills

Social engineering can be that easy.

Observation is key. No-tech hacking relies on keen observation and exploiting human nature rather than technical skills. By paying attention to their surroundings, hackers can gather valuable information without using any sophisticated tools or technology.

Human vulnerabilities. People's natural inclination to be helpful, avoid awkward situations, and take things at face value creates opportunities for social engineers. Simple techniques like tailgating, shoulder surfing, and dumpster diving can yield surprising amounts of sensitive data.

Everyday opportunities. No-tech hacking opportunities are everywhere in daily life - from discarded documents to carelessly displayed screens to overheard conversations. By adopting a hacker mindset and staying alert, one can spot these vulnerabilities that most people overlook.

2. Dumpster diving reveals sensitive information carelessly discarded

Put In Parking Lot For Everyone To Read.

Careless disposal. Organizations and individuals frequently discard sensitive documents without proper shredding or destruction. Dumpster divers can easily retrieve intact paperwork containing confidential data, from financial records to medical information.

Easy targets. Unsecured dumpsters and recycling bins, especially those of businesses, are prime hunting grounds. Even documents left in plain sight near trash areas can yield valuable information.

Prevention is key. To thwart dumpster divers:

  • Shred all sensitive documents before disposal
  • Use cross-cut or micro-cut shredders for maximum security
  • Lock dumpsters and recycling bins
  • Implement strict document disposal policies
  • Educate employees on proper handling of sensitive information

3. Tailgating and social engineering grant unauthorized access

They thanked me for holding the door for them despite the fact that I had just broken into their building because of them.

Exploiting politeness. Tailgating takes advantage of people's natural inclination to hold doors open for others. By dressing the part and acting confidently, hackers can slip into secure areas behind authorized personnel.

The power of pretexting. Social engineering involves creating a false scenario to manipulate targets into divulging information or granting access. Common pretexts include posing as IT support, delivery personnel, or new employees.

Preventing unauthorized entry:

  • Train employees to challenge unfamiliar faces
  • Implement strict visitor policies and escorts
  • Use multi-factor authentication for access
  • Install security turnstiles or mantraps
  • Foster a security-conscious culture

4. Shoulder surfing exposes confidential data in public spaces

I had captured video, too, and (might have) become very familiar with the tools, protocols and processes he used (or may not have used) to interact with the ATM machine.

Public vulnerability. People often work on sensitive information in public spaces like airports, coffee shops, and trains, unaware that others can easily view their screens. Shoulder surfers can gather passwords, financial data, and confidential documents.

Electronic deduction. Even brief glimpses of a screen can reveal valuable information about a person's identity, occupation, and activities. Hackers can piece together surprising amounts of data from icons, open windows, and visible text.

Protecting against shoulder surfing:

  • Use privacy screens on laptops and mobile devices
  • Be aware of surroundings when working in public
  • Angle screens away from public view
  • Avoid accessing sensitive information in crowded areas
  • Enable quick screen locking on devices

5. Physical security vulnerabilities persist despite high-tech measures

Passwords Are Nifty, Especially Default Ones

Low-tech bypasses. Many seemingly secure physical locks and systems can be defeated with simple tools or techniques. Examples include:

  • Lock bumping to open pin tumbler locks
  • Shimming padlocks with strips of metal
  • Bypassing electronic locks with magnets or exploits

Human error. The weakest link in physical security is often human behavior:

  • Using default passwords on electronic systems
  • Leaving keys or access cards unattended
  • Propping open secure doors for convenience

Layered security. To improve physical security:

  • Implement multiple layers of protection
  • Regularly audit and test security measures
  • Train staff on security awareness and procedures
  • Use high-security locks resistant to common attacks
  • Keep security systems and firmware up-to-date

6. Google hacking uncovers sensitive information inadvertently exposed online

It's not Google's fault if your sensitive data makes it online.

Unintended exposure. Organizations and individuals often unknowingly expose sensitive data on public-facing web servers. Google's powerful search capabilities allow hackers to easily find this information using specialized search queries.

Types of exposed data:

  • Confidential documents and spreadsheets
  • Login credentials and passwords
  • Server and database information
  • Financial and personal records
  • Internal communications and emails

Preventing Google hacking:

  • Regularly audit public-facing web content
  • Use robots.txt to prevent indexing of sensitive directories
  • Implement proper access controls on web servers
  • Educate employees on safe file sharing practices
  • Utilize web vulnerability scanning tools

7. P2P networks leak private data through misconfigured file sharing

If an attacker finds one marginally sensitive document, he'll almost certainly browse the machine that shared the file to find more.

Accidental sharing. Users often inadvertently share entire hard drives or sensitive folders when using peer-to-peer file sharing networks. This can expose personal documents, financial records, and confidential business information.

Persistent risk. Despite the decline of some P2P networks, file sharing remains a significant source of data leaks. Many users are unaware of the extent of what they're sharing or the risks involved.

Mitigating P2P risks:

  • Avoid installing P2P software on work computers
  • Carefully configure sharing settings if P2P must be used
  • Regularly audit shared folders for sensitive content
  • Use dedicated machines for P2P separate from sensitive data
  • Educate users on the dangers of misconfigured file sharing

8. People watching yields surprising insights about individuals

A decent no-tech hacker can get a good read on a person by just paying attention.

Observation skills. People watchers can deduce significant information about individuals based on their appearance, behavior, and belongings. This includes profession, socioeconomic status, and personal habits.

Contextual clues. Items like security badges, luggage tags, and company logos provide valuable information about a person's identity and affiliations. Even small details like the type of watch or shoes can offer insights.

Privacy implications. The ease of gathering personal information through observation highlights the importance of maintaining awareness of one's surroundings and minimizing visible indicators of sensitive data or affiliations, especially in public spaces.

9. Kiosks and ATMs are vulnerable to simple hacking techniques

A good friend of mine, CP, has this wild ability to make machines do crazy things.

Escaping kiosk mode. Many public kiosks and terminals can be broken out of their restricted interfaces using simple keyboard shortcuts or exploits. This can grant access to the underlying operating system and sensitive data.

ATM vulnerabilities. Despite their critical nature, ATMs often run on standard PC hardware and software, making them susceptible to various attacks. Physical access to an ATM's internals can reveal valuable information about its operation.

Improving kiosk security:

  • Use purpose-built kiosk software and hardware
  • Disable unnecessary OS functions and services
  • Implement proper access controls and user privileges
  • Regularly patch and update kiosk systems
  • Physically secure kiosks to prevent tampering

10. Vehicle surveillance provides unexpected personal information

Oil change stickers like this one seem pretty innocuous, but a no-tech hacker can use simple deduction to realize that the address is probably close to where the owner works or lives.

Vehicles as information sources. Cars and their contents can reveal surprising amounts of personal data about their owners. This includes workplace, residence, financial status, and daily routines.

Types of vehicle intelligence:

  • Parking permits and security stickers
  • Service records and oil change reminders
  • Visible documents and receipts
  • Vehicle make, model, and condition
  • Bumper stickers and personalization

Privacy considerations. To minimize information leakage:

  • Remove or obscure identifying stickers and permits when not needed
  • Don't leave sensitive documents visible in vehicles
  • Be mindful of what personal information car decorations might reveal
  • Regularly clean out vehicles to remove information-rich items

11. Exposed badges compromise access control systems

Visual identification of an employee badge is not a secure authentication mechanism.

Badge vulnerabilities. Employee badges and access cards, when visible or carelessly displayed, can be easily cloned or replicated by attackers. This compromises even sophisticated electronic access control systems.

Common exposures:

  • Wearing badges outside the workplace
  • Displaying badges in vehicles
  • Posting badge photos on social media
  • Leaving badges unattended on desks or in public

Enhancing badge security:

  • Implement strict policies on badge handling and display
  • Use multi-factor authentication for sensitive areas
  • Regularly audit and update access control systems
  • Train employees on the importance of badge security
  • Consider badge designs that are difficult to photograph or replicate

Last updated:

Review Summary

3.94 out of 5
Average of 100+ ratings from Goodreads and Amazon.

No Tech Hacking receives mixed reviews, with an average rating of 3.94/5. Readers appreciate its introduction to social engineering and physical penetration testing, praising the mix of stories and practical steps. Many find it thought-provoking and a quick read, highlighting its insights on security awareness. Some criticize the book's execution, comparing it to a "for Dummies" guide. The Google Hacking chapter is noted as being recycled from another book by the same author. Overall, readers find value in the book's ability to make them more observant and security-conscious.

Your rating:

About the Author

Johnny Long is a multifaceted individual with a diverse set of skills and interests. As a professional hacker, he has gained recognition in the field of information security. Long is also an author, sharing his expertise through his writings. His Christian faith is an important aspect of his identity. Long's adventurous spirit is evident in his self-description as a pirate by blood and a ninja in training. He maintains an online presence through his website and is actively involved in charitable work. As the founder of Hackers For Charity, Long combines his hacking skills with philanthropic efforts, providing opportunities for hackers to gain experience while supporting charitable causes.

Download PDF

To save this No Tech Hacking summary for later, download the free PDF. You can print it out, or read offline at your convenience.
Download PDF
File size: 0.32 MB     Pages: 12

Download EPUB

To read this No Tech Hacking summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 3.02 MB     Pages: 10
0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Create a free account to unlock:
Bookmarks – save your favorite books
History – revisit books later
Ratings – rate books & see your ratings
Unlock unlimited listening
Your first week's on us!
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Nov 22,
cancel anytime before.
Compare Features Free Pro
Read full text summaries
Summaries are free to read for everyone
Listen to summaries
12,000+ hours of audio
Unlimited Bookmarks
Free users are limited to 10
Unlimited History
Free users are limited to 10
What our users say
30,000+ readers
“...I can 10x the number of books I can read...”
“...exceptionally accurate, engaging, and beautifully presented...”
“...better than any amazon review when I'm making a book-buying decision...”
Save 62%
Yearly
$119.88 $44.99/yr
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Settings
Appearance