Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Unauthorised Access: Physical Penetration Testing For IT Security Teams 1st Edition

4.5 out of 5 stars 8 customer reviews
ISBN-13: 978-0470747612
ISBN-10: 0470747617
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Trade in your item
Get a $6.32
Gift Card.
Have one to sell? Sell on Amazon
Rent On clicking this link, a new layer will be open
$15.90 On clicking this link, a new layer will be open
Buy used On clicking this link, a new layer will be open
$21.46 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$26.10 On clicking this link, a new layer will be open
More Buying Choices
36 New from $19.83 23 Used from $16.95
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Windows10ForDummiesVideo
Windows 10 For Dummies Video Training
Get up to speed with Windows 10 with this video training course from For Dummies. Learn more.
$26.10 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Unauthorised Access: Physical Penetration Testing For IT Security Teams
  • +
  • Hacking Exposed 7: Network Security Secrets and Solutions
  • +
  • Hacking: The Art of Exploitation, 2nd Edition
Total price: $76.88
Buy the selected items together

Editorial Reviews

From the Back Cover

In this book Wil Allsopp has created a thorough reference for those looking to advance into the area of physical penetration testing. The book also serves as a guidebook for in-house security managers seeking to institute better policy safeguards.” – From the Foreword, by Kevin Mitnick

Most IT security teams concentrate on keeping networks and systems safe from the outside – usually with the entire focus on firewalls, server configuration, application security, intrusion detection systems, and the like. But what if your attacker was on the inside? What if they were sitting at an employee’s computer, or placing a wireless access point hidden in a wiring closet or even roaming inside your server room?

Unauthorised Access provides the first guide to planning and performing physical penetration tests. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight) and getting access to networks and data. Learn to think like an attacker with topics that include:

  • Types of target vs level of anticipated response
  •  Dealing with guards
  •  Intelligence tradecraft, satellite imagery and in depth information gathering
  •  Planting bugs and covert wireless access points
  •  Hacking security cameras
  •  Strategic, tactical and operational planning
  •  Defeating locks, electronic keypads and other electronic access systems
  •  Social engineering - the weakest link
  •  Using your “Get Out of Jail Free” card
  •  Complying with local laws
  •  Attacking wireless networks
NO_CONTENT_IN_FEATURE

New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Paperback: 308 pages
  • Publisher: Wiley; 1 edition (September 21, 2009)
  • Language: English
  • ISBN-10: 0470747617
  • ISBN-13: 978-0470747612
  • Product Dimensions: 7.4 x 0.7 x 9.3 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (8 customer reviews)
  • Amazon Best Sellers Rank: #837,152 in Books (See Top 100 in Books)

Customer Reviews

5 star
50%
4 star
50%
3 star
0%
2 star
0%
1 star
0%
See all 8 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Unauthorised Access is nothing short of a manual for corporate espionage. Author Wil Allsopp, is a "penetration tester", a hired gun brought in by companies to find out how effective the security defences protecting their premises are.

While conventional penetration testing ("pentesting") involves remote hacking, typically through software vulnerabilities, physical pen-testers gain access to a company's offices or data centre with the goal of connecting to a restricted network, planting a bug or even an imitation explosive device

With ten years experience as a pen-tester, Allsopp offers superb insight into common methods used by criminals to manipulate employees, from phone calls to outright espionage. The chapter on social engineering, in particular, is guaranteed to spark paranoia and sleepless nights among even the most grizzled chief security officers.

Specific tactics he reveals include employing politeness, inducing fear, faking supplication, invoking authority, ingratiation and deference, and even sexual manipulation.

Another chapter details several successful pen-tests conducted by Allsopp and his team, including attacks on a UK power plant and a supercomputing facility conducting spatial modelling of nuclear explosions for the military. He also describes the antics of a pentester who bypassed the security of a large corporate by observing the uniform of the firm's security guard, then showing up the next day in identical costume, pulling rank and relieving the man of duty

The enjoyment Allsopp clearly derives from his work is reflected in his book; he writes with that particular tone of repressed glee common among white hat hackers.
Read more ›
1 Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Wil brings to the table a very knowledgeable and down to earth approach on the needs for Cyber-security. He does NOT go in depth, but that is just fine, because he peeks your interest to learn more from other resources or gets you prepared to understand the basics of cyber-security. A good purchase; well worth the price.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
As the author notes several times throughout the book, this work is not exhaustive on any one subject. It does, however, provide a very nice overview of penetration testing as a whole. It covers several aspects that I wouldn't have thought of.

As a systems administrator, I bought this book to get some ideas about weak points in our network/physical security. After reading through some of the examples and case studies, I have made some changes that I think will go a long way in beefing up our security.

I would definitely recommend reading this book if you have any interest in IT/Physical security.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
A good, solid intro to penetration testing. Obviously each aspect of penetration testing deserves its own separate book, but I won't penalize the book for that. I enjoyed it.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Unauthorised Access: Physical Penetration Testing For IT Security Teams