Summary of How I Socially Engineer Myself into High Security Facilities

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

How I Socially Engineer Myself into High Security Facilities summary
Start getting smarter:
or see our plans




  • Applicable
  • Eye Opening
  • Insider's Take


Every office building and computer network has vulnerabilities. The task of security professionals is to find them before criminals do. Many companies hire “pentesters” (penetration testers) who get creative at breaking into buildings and networks to evaluate an organization’s defenses. In a short article posted on Motherboard, penetration tester Sophie Daniel shares the tale of her most memorable break-in and draws conclusions about organizations’ most common vulnerabilities. getAbstract believes that her story serves as a warning to employees at every level.  

About the Author

Sophie Daniel is a facilities penetration tester and information security consultant. 



As a “pentester” (penetration tester), Sophie Daniel is responsible for evaluating the security of organizations by finding and exploiting their vulnerabilities. Although picking locks and climbing over walls are among her tactics, Daniel has found “social engineering” to be the most effective way to gain access to restricted locations.

One break-in that made Daniel simultaneously pleased with and shocked at herself required gaining access to an iron-gated manufacturing plant and nearby data center with “armed guards, badge readers, biometric security controls and turnstiles at every entrance.”  After studying the maps, ...

More on this topic

Customers who read this summary also read

Spotify’s $30 Billion Playlist for Global Domination
The Secrets to Designing a Curiosity-Driven Career
The Huge Benefits of Working in Your Second Language
The Myth of "Learning Styles"
Olympic Icon Flo Jo Raced to the Top and Took Us with Her
A Structured Approach to Strategic Decisions

Related Channels

Comment on this summary