Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 2. Low tech vulnerabilities > Clean out your elephant burial ground

Clean out your elephant burial ground

What happens when that computer (and elephant in this analogy) that you purchased a few years ago finally dies or becomes too old to do any work for you? I'll bet that it gets moved to your elephant burial ground with the rest of the electronic equipment that still looks new and valuable but isn't fast enough to keep up anymore. You can't simply put it out for the trash collectors to pick up, so there it sits, sometimes for years.
This burial ground was a prime target for our penetration teams as we conducted our vulnerability tests from inside our clients' buildings. We frequently used our social engineering skills to find out where the old computers were stored. If it was in a locked room, we would find a way to either get someone to open the door for us, or we would use our lock picks or pick gun to open the door.

  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint