Summary of How I Socially Engineer Myself into High Security Facilities

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

How I Socially Engineer Myself into High Security Facilities summary
Start getting smarter:
or see our plans


7 Overall

8 Applicability

7 Innovation

7 Style


Every office building and computer network has vulnerabilities. The task of security professionals is to find them before criminals do. Many companies hire “pentesters” (penetration testers) who get creative at breaking into buildings and networks to evaluate an organization’s defenses. In a short article posted on Motherboard, penetration tester Sophie Daniel shares the tale of her most memorable break-in and draws conclusions about organizations’ most common vulnerabilities. getAbstract believes that her story serves as a warning to employees at every level.  

In this summary, you will learn

  • How “pentesters” (penetration testers) use social engineering to break into buildings and
  • What organizations can do to prevent unauthorized outsiders from accessing their facilities.

About the Author

Sophie Daniel is a facilities penetration tester and information security consultant. 



As a “pentester” (penetration tester), Sophie Daniel is responsible for evaluating the security of organizations by finding and exploiting their vulnerabilities. Although picking locks and climbing over walls are among her tactics, Daniel has found “social engineering” to be the most effective way to gain access to restricted locations.

Get the key points from this article in 10 minutes.

For you

Find the right subscription plan for you.

For your company

We help you build a culture of continuous learning.

 or log in

Comment on this summary

More on this topic

Customers who read this summary also read

More by category