𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

✍ Scribed by Thomas Wilhelm, Jason Andress


Publisher
Syngress
Year
2010
Tongue
English
Leaves
314
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Discusses techniques used by malicious attackers in real-world situationsDetails unorthodox penetration testing techniques by getting inside the mind of a ninjaExpands upon current penetration testing methodologies including new tactics for hardware and physical attacks


πŸ“œ SIMILAR VOLUMES


Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te

Ninja Hacking Unconventional Penetration
✍ Thomas Wilhelm, Jason Andress, Bryan (con) Garner πŸ“‚ Library πŸ“… 2011 πŸ› Elsevier 🌐 English

<h3>Pressestimmen</h3><p>"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict re

Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

<p>Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical

Ninja Hacking: Unconventional Penetratio
✍ Wilhelm, Thomas, Andress, Jason πŸ“‚ Library πŸ“… 2014 πŸ› Elsevier Science 🌐 English

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first

Hacking with Kali: Practical Penetration
✍ James Broad, Andrew Bindner πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of