Ninja hacking : unconventional penetration testing tactics and techniques /

Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests....

Full description

Saved in:
Bibliographic Details
Main Authors: Wilhelm, Thomas. (Author)
Corporate Authors: Elsevier Science & Technology.
Group Author: Andress, Jason
Published: Syngress/Elsevier,
Publisher Address: Amsterdam ; Boston :
Publication Dates: 2011.
Literature type: eBook
Language: English
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781597495882
Summary: Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.
Carrier Form: 1 online resource (xxii, 310 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781597495882
1597495883
Index Number: HD30
CLC: F270.7
Contents: Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement.