𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques

✍ Scribed by Thomas Wilhelm, Jason Andress, Bryan (con) Garner


Publisher
Elsevier
Year
2011
Tongue
English
Leaves
310
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Pressestimmen

"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict regulations and an adherence to a code of ethics. Therefore it becomes increasingly difficult to incorporate the culture of the unconventional warrior into our new world. Enter Wilhelm and Andress, who make it safe to show off your fu again. By the end of this book, the security professional is given the philosophical foundation along with a practical framework from which to leverage the way of the ninja. What could be cooler?"--Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today."----Donald C. Donzal, Editor-in-Chief, The Ethical Hacker Network "When they put "unconventional" in the title, the authors weren't exaggerating. Perhaps the most unusual book written on computer security, this volume centers around detailed descriptions of the ethics, mindset, and tactics used in the Japanese martial arts commonly called ninja. The history of ninja fighting arts and the samurai warriors who practiced them are described in the first chapter. Each subsequent chapter presents specific ninja tactics, including intelligence, use of weapons, surveillance, and sabotage, then applies them to effective computer security management. Both authors are computer security specialists. The book also benefits from a Ninjutsu consultant, Bryan R. Garner, and a technical editor, Joshua Abraham."--SciTechBookNews "With the good blend of historical techniques and its modern day application there is something in here for everyone."--Hakin9

Kurzbeschreibung

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! This title: discusses techniques used by malicious attackers in real-world situations; details unorthodox penetration testing techniques by getting inside the mind of a ninja; and, expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.


πŸ“œ SIMILAR VOLUMES


Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te

Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te

Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

<p>Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical

Ninja Hacking: Unconventional Penetratio
✍ Wilhelm, Thomas, Andress, Jason πŸ“‚ Library πŸ“… 2014 πŸ› Elsevier Science 🌐 English

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first

Hacking with Kali: Practical Penetration
✍ James Broad, Andrew Bindner πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of