Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
β Scribed by Thomas Wilhelm, Jason Andress
- Publisher
- Syngress
- Year
- 2010
- Tongue
- English
- Leaves
- 314
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Discusses techniques used by malicious attackers in real-world situationsDetails unorthodox penetration testing techniques by getting inside the mind of a ninjaExpands upon current penetration testing methodologies including new tactics for hardware and physical attacks
π SIMILAR VOLUMES
<h3>Pressestimmen</h3><p>"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict re
<p>Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of