Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company’s assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don’t you want to be a ninja for a day just because they’re cool? Let this book be your excuse!
* Discusses techniques used by malicious attackers in real-world situations
* Details unorthodox penetration testing techniques by getting inside the mind of a ninja
* Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks
Review
“The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict regulations and an adherence to a code of ethics. Therefore it becomes increasingly difficult to incorporate the culture of the unconventional warrior into our new world. Enter Wilhelm and Andress, who make it safe to show off your fu again. By the end of this book, the security professional is given the philosophical foundation along with a practical framework from which to leverage the way of the ninja. What could be cooler?”–Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today.”
–Donald C. Donzal, Editor-in-Chief, The Ethical Hacker Network
download
Subscribe to:
Post Comments (Atom)
Subscribe via email
My Blog List
-
-
-
*Cisco AnyConnect Secure Mobility Client v3.0.0611 | 11 Mb* The Cisco AnyConnect Secure Mobility Solution provides a comprehensive, highly secure enterprise...
-
Suara kamera di hp nokia sangat mengganggu, pengen narsis tapi gak nyaman dilihat orang..he2..apalagi kalo foto di mall, kampus, WC dll.......kkkkkk silahk...
0 comments:
Post a Comment