,

Ninja Hacking

Unconventional Penetration Testing Tactics and Techniques

Specificaties
Paperback, 310 blz. | Engels
Syngress Publishing | 1e druk, 2011
ISBN13: 9781597495882
Rubricering
Hoofdrubriek : Computer en informatica
Syngress Publishing 1e druk, 2011 9781597495882
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today?s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company?s assets.

Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don?t you want to be a ninja for a day just because they?re cool? Let this book be your excuse!

- Discusses techniques used by malicious attackers in real-world situations
- Details unorthodox penetration testing techniques by getting inside the mind of a ninja
- Expand upon current penetration testing methodologies including new tactics for hardware and physical attacks

Audience:
Penetration testers; Security consultants; IT security professionals including system / network administrators; hackers

Specificaties

ISBN13:9781597495882
Taal:Engels
Bindwijze:paperback
Aantal pagina's:310
Druk:1

Inhoudsopgave

About the Authors
About the Ninjutsu Consultant
About the Technical Editor
Introduction

1. The Historical Ninja
2. The Modern Ninja
3. Strategies and Tactics
4. Exploitation of Current Events
5. Disguise
6. Impersonation
7. Infiltration
8. Use of Timing to Enter an Area
9. Discovering Weak Points in Area Defenses
10. Psychological Weaknesses
11. Distraction
12. Concealment Devices
13. Covert Listening Devices
14. Intelligence
15. Surveillance
16. Sabotage
17. Hiding and Silent Movement

Silent

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Ninja Hacking