Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$49.95$49.95
FREE delivery:
Thursday, Sep 14
Payment
Secure transaction
Ships from
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Buy used: $15.90
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Low Tech Hacking: Street Smarts for Security Professionals 1st Edition
| Price | New from | Used from |
- Kindle
$17.27 - $49.95 Read with Our Free App - Paperback
$15.90 - $49.959 Used from $10.56 8 New from $44.78
Purchase options and add-ons
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.
Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.
This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
- Contains insider knowledge of what could be your most likely Low Tech threat
- Includes timely advice from some of the top security minds in the world
- Covers many detailed countermeasures that you can employ to improve your security posture
- ISBN-101597496650
- ISBN-13978-1597496650
- Edition1st
- PublisherSyngress
- Publication dateJanuary 2, 2012
- LanguageEnglish
- Dimensions7.5 x 0.6 x 9.25 inches
- Print length264 pages
Popular titles by this author
Editorial Reviews
Amazon.com Review
Top 10 List of Just a Few Things to Consider About the Locks that We Use at Home and at Work to Hopefully Make Physical Security Really Secure
By Jack Wiles, AKA “Low Tech Jack,” Lead Author, Low Tech Hacking
Jack Wiles
1. Learn More About Locks. Modern pin tumbler locks have been around, and virtually unchanged, since the mid 1800s. They have remained a mystery to most people until the Internet made the world a much smaller place. It's encouraging to see more people take an interest in learning how locks work, and how vulnerable some of them are to being bypassed using some very low-tech methods.
2. Check Your Locks. Locks are obviously mechanical devices and subject to mechanical malfunction. In every inside penetration test that I took part in, we found as least one lock that was not functioning because of lack of preventative maintenance or improper installation.
3. Buy Good Locks. When I'm in the hardware section of a store that sells locks, I like to watch people as they go about the process of selecting a lock for their home or school locker. Since most locks look pretty much the same on the outside, most people select the least expensive lock that they can find. These locks might work just fine, but from a security standpoint, as is usually the case, we get what we pay for. Invest just a little more and buy good locks.
4. Who Has The Keys To Your World At Work? Key control is absolutely critical in the business world. Many buildings have Master, Grand Master, and even Great Grand Master key coding systems. Many of these key systems have remained unchanged for years. It's important to know where these master keys (or any building keys for that matter) are, and who has copies of them. This is certainly the case if the keys use a key blank that is somewhat common and easily duplicated. I've been amazed to see the number of different key blanks that small key cutting vendors have on hand at local flea markets where keys can be duplicated for about $1, no questions asked.
5. Audit Your Locks. I've been preaching about the need to audit locks for many years now. I'm talking about a close functionality audit to insure that the locks are working properly, are installed properly, and that they show no signs of being tampered with, to include picking attempts. This audit could also be good Risk Management Due Diligence on an audit report.
6. Check Out YouTube. "If it's on YouTube, you had better know about it." While we were writing Low Tech Hacking, I found myself making that statement several times. YouTube is a great place to learn for the Good Guys, as well as any Bad Guys who want to see how things are done. If a picture is worth a thousand words, just how much is a 10- to 20-minute detailed video worth? If a lock picking or bypass method that describes the kind of locks that you have or use is described anywhere on the Internet, it's a good idea for you to know about it. The Bad Guys probably do!
7. Start a Lock Sport Enthusiast Group. When I started to learn about locksmithing back in the early 1970s, there were no lock sport enthusiast groups anywhere that I am aware of. Locksmithing and lock picking were more of a secretive art, and not something that the average person knew anything about. Two groups that I am aware of that encourage enthusiasts to make lock picking a sport, FALE Association of Lock Picking Enthusiasts and TOOOL The Open Organisation of Lockpickers, have websites where you can learn a lot about these interesting semi-ancient puzzles.
8. Don't Forget About Your Locks At Home. You just purchased a new (or new to you) home. Who has the keys to your new world? Unless your new home has very high security locks installed, you have no way of knowing who has a copy of the keys. For a home, I always suggest having the locks re-keyed, or installing new locks that you know won't work with whatever old keys are out there. That won't stop other methods of entry past those locks, but it will stop the lowest tech entry method of simply opening the door by using a copy of the original key. Key control and lock bypass methods in buildings is another story, and just as critical. That subject is addressed in our new Low Tech Hacking book in more detail than I can cover here.
9. Train Your Staff. Security Awareness Training is the most effective and overall least expensive security countermeasure that you can employ. Throughout the past 20 years, I have personally trained over 10,000 people in some form of awareness training, so I know how effective it can be. Employees want to help with security, and they will become an additional set of eyes and ears for a company when they are taught how important they are as a part of the security team. I don't provide awareness training anymore, so I'm not trying to sell training by this statement. It is important enough of a subject to me that I did have Mr. Sean Lowther write a complete chapter on the subject in our Low Tech Hacking book.
10. Purchase Deviant's Book--Practical Lock Picking. I really like Practical Lock Picking by Deviant Ollam (Syngress 2010). Our Low Tech Hacking book covers a number of other lock bypass methods, and we recommend Deviant's book to everyone interested in learning more about the art (and possible new hobby) of lock picking.
Review
"In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans, bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack…Overall, [it] is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker…The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing." --Security Management, February 2013 and other publications
"In the age of extreme technology, the defenders have made Low Tech a low priority, concentrating more on the common high tech solutions intended to protect organizations. But attackers are resurrecting the art of Low Tech Hacking. The techniques discussed in this book are given new life because they allow attackers to strike at the weakest links: human and physical. This book is the right tool to bring the Low Tech back into focus." --Greg Miles, Ph.D., CISSP, CISA, Principal at Peak Security, Inc.
"Low Tech Hacking is perfect for waking people up to the dangers that lurk on the Internet and especially in their physical environment. All chapters are littered with helpful tips and warnings, which more often then not include the authors' ‘war stories’ as illustrative examples. And even though the book has been written by five different authors, they all do a great job at keeping the explanations and examples clear and concise, and at making us think for ourselves and consider things we never marked before. In short, I would effectively recommend this book to everyone." --Net-Security.org
"While the media focuses on grand-scale hacking, companies are losing money every day from simpler hacking techniques. This book, by Jack Wiles, Terry Gudaitis, Jennifer Jabusch, Russ Rogers and Sean Lowther, details less sophisticated hacking techniques, such as social engineering, wireless hacking, and surveillance to gain valuable data, and offers countermeasures."--iWeek Magazine.com
"All in all, Low Tech Hacking is a great overview of unconventional offensive and defensive methods to secure an organization. It will not make testers experts on physical security or wireless attacks all of a sudden, but it is a lively and useful starting point for further reading and training and a handy reference during an audit, too."--Computers and Security 31 {2012} 738
Review
Learn how to avoid and defend against some of the simplest and most common hacks!
From the Back Cover
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.
About the Author
Jennifer Jabbusch, CISSP, CISO, HP MASE, JNCIA-AC, is a network security engineer and consultant with Carolina Advanced Digital, Inc. Jennifer has more than 15 years' experience working in various areas of the technology industry. Most recently, she has focused in specialized areas of infrastructure security, including Network Access Control, 802.1X and Wireless Security technologies. Ms. Jabbusch has consulted for a variety of government agencies, educational institutions, and Fortune 100 and 500 corporations and has spoken at a variety of conferences including DeepSec, SecTor, TechnoSecurity, RSA®, InfoSec World, CSI, and many others. In addition to her regular duties, she participates in a variety of courseware and exam writings and reviews, including acting as subject matter expert in the Cryptography domain of the official (ISC)2® CISSP® courseware (v9). You can find more security topics and musings on her security blog at http://SecurityUncorked.com.
Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal agency and the co-founder and chief executive officer of Peak Security, Inc., a veteran-owned small business based in Colorado Springs, CO. Russ has been involved in information technology since 1980 and has spent the past 20 years working as both an IT and InfoSec consultant. Russ has worked with the U.S. Air Force (USAF), National Security Agency (NSA), Defense Information Systems Agency (DISA), and other federal agencies. He is a globally renowned security expert, speaker, and author who has presented at conferences around the world in Amsterdam, Tokyo, Singapore, São Paulo, Abu Dhabi, and cities all over the United States. Russ has an honorary doctorate of science in information technology from the University of Advancing Technology, a master's degree in computer systems management from the University of Maryland, a bachelor of science degree in computer information systems from the University of Maryland, and an associate's degree in applied communications technology from the Community College of the Air Force. He is a member of ISSA and (ISC)2® (CISSP). Russ also teaches at and fills the role of professor of network security for the University of Advancing Technology (www.uat.edu).
Jack Wiles is a security professional with over 40 years' experience in security-related fields. This includes computer security, disaster recovery, and physical security. He is a professional speaker, and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects, which are now being labeled "Homeland Security" topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, IRS-CID, U.S. Customs, Department of Justice, The Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68, where he was awarded two Bronze stars for his actions in combat. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career.
Sean Lowther is the President and Founder of Stealth Awareness, Inc. (www.stealthawareness.com). Sean is an independent consultant who brings years of experience designing and implementing information security awareness programs at the highest level. He founded Stealth Awareness, Inc. in 2007. Sean worked at Bank of America for over seven years, managing the enterprise information security awareness program. The program received the highest rating from its regulators and was consistently rated "world class" by industry peer groups. Sean has worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the enactment of the Gramm-Leach-Bliley Act. He produced the video "It's Not If, But When" for the Financial Services Sector Coordinating Council in partnership with the U.S. Treasury Department with the goal to improve critical infrastructure protection and Homeland Security.
Product details
- Publisher : Syngress; 1st edition (January 2, 2012)
- Language : English
- Paperback : 264 pages
- ISBN-10 : 1597496650
- ISBN-13 : 978-1597496650
- Item Weight : 1.19 pounds
- Dimensions : 7.5 x 0.6 x 9.25 inches
- Best Sellers Rank: #3,373,926 in Books (See Top 100 in Books)
- #2,087 in Computer Hacking
- #2,532 in Information Management (Books)
- #18,624 in Computer Science (Books)
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the authors

As A combat veteran of the Vietnam War, I am always looking for ways to help my fellow veterans, especially those who were not as fortunate as I was to be able to come home physically able to pursue a normal life.
Jack Wiles
Lieutenant Colonel (Retired)
101st Airborne Division
Vietnam 67 -68
Here's my brief bio:
Jack,(PPS) is a Security Professional with over 50 years of experience in security-related fields, including both physical and technical security. He is a 20 year professional member of the National Speakers Association (NSA) and has trained hundreds of federal agents and senior security specialists on a number of computer crime-related topics.
In 2011, Jack's fellow members of the Carolina Chapter of NSA voted him Member Of The Year.
As a graduate of the Executive Protection Institute (Class 48), Jack is also a certified Personal Protection Specialist (PPS). He specializes in what he calls "Technical Executive Protection" in helping others stay safe on the Internet.
Of all of the security related fields that Jack worked in during his half-century career, he enjoys training the most. He always enjoyed teaching people how to be less likely to be a victim of a violent crime by teaching them how to be more aware of their surroundings all the time. Now that he is retired, he is noted for providing timely, memorable and fun presentations to local church groups and civic groups at no cost. His goal is to do or say some things that attendees remember forever. Their lives might depend on it!
While serving his country in Vietnam, he was awarded 2 Bronze Stars and an Army Commendation Medal for his actions in combat. During his final seven years of Military service, he was assigned directly to The Pentagon as a drilling IMA Reservist.
Stay safe out there, and God Bless America!
Low Tech Jack

Sean Lowther founded Stealth Awareness, Inc., (www.stealthawareness.com) in 2007 after 15 years of designing physical security and information security awareness programs at two of the largest financial institutions in the world. Sean designed and implemented the information security awareness program at Bank of America. The program received the highest rating from its regulator and was considered “world class” by industry peers.
Sean has worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the enactment of the Gramm-Leach-Bliley Act. He produced the video “It’s Not If, But When” for the Financial Services Sector Coordinating Council in partnership with the U.S. Treasury Department with the goal to improve critical infrastructure protection and Homeland Security. Sean was recognized by senior government officials and business executives for his “work to defend our nation’s critical infrastructure.”
Sean has worked with many notables in the information security field including Rhonda MacLean, Roger Callahan, Sam Phillips, Pete Murphy, Peter Browne, and many others.
Sean coauthored Techno Security’s Guide to SCADA, A Comprehensive Handbook on Protecting the Critical Infrastructure, and Low Tech Hacking, Street Smarts for Security Professionals.

Jennifer (JJ) Minella is an internationally-recognized authority on network and wireless security architecture, a published author and public speaker. A network architect turned advisory CISO and infosec leader, in the past ~15 years she's worked with hundreds of organizations up to Fortune 50 on strategies ranging from network security to leadership. In addition to her normal roles, she's an editorial contributor and trusted adviser for information security strategy for technology manufacturers. No stranger to public speaking, she’s a highly sought-after international speaker.
Jennifer is the founder and principal advisor of Viszen Security, offering technical strategy, network security architecture, and coaching to CXOs and practitioners.
JJ's also known for introducing mindfulness-based leadership to individuals and organizations in infosec. And aside from meditation and security, she's a competitive powerlifter and dancer including ballroom and swing. She also loves Figment, the imagination dragon.
Ms. Minella served on the (ISC)2 Board of Directors 2014-2019 in various roles including Chairman of the Board in 2019. She also serves as faculty with IANS and is a startup/VC and board advisor.
You can find more security topics and musings on her security blog at http://SecurityUncorked.com.
Mrs. Minella speaks regularly and national and international security conferences, including
:: SPEAKING & ENGAGEMENTS::
- Wireless Technology Forum
- Wireless LAN Pros Conference (Phoenix, AZ)
- Deep Sec Conference (Vienna, Austria)
- BruCon (Gent, Belgium)
- Internet Summit (Raleigh, NC)
- CITE Consumerization of IT (San Francisco, US)
- SecTor (Toronto, ON)
- NSA Trusted Computing Conference (Orlando. FL)
- (ISC)2 Security Summit (Hong Kong)
- INTEROP (Las Vegas, NV)
- RSA USA (San Francisco, CA)
- Infosec World (Orlando, FL)
- CSI Annual Conference (Washington, DC)
- Techno Security Keynote (Myrtle Beach, SC)
- (ISC)2 Annual Congress (various)
- Triangle InfoSeCon (Raleigh, NC)

Russ Rogers was born in Oklahoma and attended the University of Oklahoma before joining the US Air Force, and graduating with a Bachelor's and Master's Degree from the University of Maryland. Russ has been involved with computers, programming, and hacking since the early 1980's; originally cutting his teeth on a Timex Sinclair 1000. Having been involved with the DEF CON hacker conference for 20 years, Russ retired as the Chief of Operations for the event. He was also a Professor of Network Security for the University of Advancing Technology, where he acted as the Program Champion/chair, attempting to ensure the degree program maintains some adherence to the requirements of industry, while still trying to stoke the inner hacker in his students. Russ has an A.S. in Communications Technology and a 2nd B.S. in Game Programming related to his own research into visualizing big data in security. He was also granted an Honorary Doctorate in Security for his contributions to the field. Russ is currently the Vice President of the BSides Las Vegas hacker conference and works in security at Xbox.
Russ was originally using dial-up modems to connect to mainframes at universities around the country, in order to access the Internet. At the time, it was still quite small, with text only web pages, and about 3,000 from around the world on IRC. His early interests center around this early internet, BBS', and BASIC programming.
I've had the good fortune to meet many of my heroes, including Steve Wozniak, Don Knuth, Alan Alcorn, and many of the original Bell Labs folks. Over the years, I've tried to shape my own life in the industry in much the same way, paying back to the community that helped me become who I am today, by continuing to contribute to DEF CON, and teaching the next generation about what it means to me, to be a hacker.
I've spoken and trained on security/hacking topics around the world, including Tokyo, Sao Paulo, Amsterdam, Dubai, and Abu Dhabi. Including my work as a technical editor, I'm credited in 20 books; and I've appeared on CNN, magazines, and radio shows, as a subject matter expert.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I highly recommend this book to anyone interested in social engineering or physical penetration-testing. The book makes excellent references to the other material and content available on the Internet and in print form, such as the social-engineer.org portal, and the recent book from Trace Security.
One thing the book doesn't mention is that keeping a steady heartbeat/pulse and keeping the sweat down can require rigorous training for some people! They do make it sound almost too easy!
Greg
In Low Tech Hacking: Street Smarts for Security Professionals, the authors, all information security veterans bring their collective experience to the printed word and show how low-tech hacks can be just as devastating as a large-scale directed attack.
The authors show how these simple attacks can be obviated by simple technical solutions, and provide numerous examples.
One of the paradigms the book uses is around lock picking. The author notes that one thing about locks is that after all is said and done, locks don't change that much. So too with information security. Even though there is significant amounts of new technologies abound to catch new sophisticated attacks. The old school attack vectors of social engineering, poor password practices and more, are often the method in which attacks penetrate networks.
The book provides many tips which the reader can use to protect themselves against many of the most devastatingly simple attacks. For example, in chapter 2 on physical security, the book details a mini physical security risk assessment you can do. By focusing on the low-hanging fruit, many of the simply steps the authors suggest can delay the attackers long enough that they decide to try another victim.
The book also provides ample amounts of advice to security staffers that they can use to secure their network. Much of chapter 4 is around low-tech wireless hacking. Many networks add wireless access for ease of use. But that user-friendliness also makes it easy for the attackers to connect to the network and launch their attack.
Overall, Low Tech Hacking: Street Smarts for Security Professional is a value reference for security professionals to use to ensure they are securing their networks adequately, to fend off the average attacker.
The authors have written a book that is light on theory, but heavy on actionable things the reader can quickly do to secure their network. And that is a very good thing.
Each author is well-suited to the topic that he or she addresses and the information remains relevant more than a year after publication. Basic security devices, social engineering, and user awareness are often overlooked because they are not really the "sexy" side of security. Since not every attack comes via the wire, defense in depth must consist of an understanding of how to secure your physical perimeter and how to guard against social engineering through awareness training. What this book lays out in plain terminology are some very important considerations that should be part of any company's layered approach to security. Once you explore the real world scenarios relayed, you'll suddenly take notice of a lot more going on around you, including what kind of weak locks are on your file cabinet, exactly how many people let others into your "secured" building just out of courtesy, and a whole array of other points to ponder.
If you're not in IT Security there is still a lot of good information about Social Engineering & physical security. If you are not in IT at all I think it is still a good, easy read and contains very good technical information on wireless networking that may not be low tech to you.
Just a thought, but the most important section for all of us may be Chapter 8: Information Security Awareness.
This book is definitely going on my book of recommended reading for my EP students.
Karl L. de la Guerra, PPS, CLSS
Chairman & Chief Executive Officer
Karl de la Guerra, Inc.
A Global Protective Services Company







