Cargando…

Ninja hacking : unconventional penetration testing tactics and techniques /

Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests....

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wilhelm, Thomas
Otros Autores: Andress, Jason
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress/Elsevier, �2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn677829108
003 OCoLC
005 20231117044449.0
006 m o d
007 cr cn|||||||||
008 101104s2011 ne a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d DKDLA  |d OCLCQ  |d VLB  |d OCLCF  |d OCLCQ  |d Z5A  |d LIV  |d UAB  |d D6H  |d OCLCQ  |d COO  |d LEAUB  |d OL$  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 769366146 
020 |a 9781597495882  |q (electronic bk.) 
020 |a 1597495883  |q (electronic bk.) 
035 |a (OCoLC)677829108  |z (OCoLC)769366146 
050 4 |a HD30.38  |b .W55 2011 
082 0 4 |a 658.472  |2 22 
100 1 |a Wilhelm, Thomas. 
245 1 0 |a Ninja hacking :  |b unconventional penetration testing tactics and techniques /  |c Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant. 
260 |a Amsterdam ;  |a Boston :  |b Syngress/Elsevier,  |c �2011. 
300 |a 1 online resource (xxii, 310 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. 
505 0 |a Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00842535 
700 1 |a Andress, Jason. 
776 0 8 |i Print version:  |a Wilhelm, Thomas.  |t Ninja hacking.  |d Amsterdam ; Boston : Syngress/Elsevier, �2011  |z 9781597495882  |w (OCoLC)610834117 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597495882  |z Texto completo