Ninja hacking: unconventional penetration testing tactics and techniques
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress/Elsevier
c2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxii, 310 p.) |
ISBN: | 9781597495882 1597495883 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300711 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597495882 |c electronic bk. |9 978-1-59749-588-2 | ||
020 | |a 1597495883 |c electronic bk. |9 1-59749-588-3 | ||
035 | |a (OCoLC)677829108 | ||
035 | |a (DE-599)BVBBV042300711 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.472 |2 22 | |
100 | 1 | |a Wilhelm, Thomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ninja hacking |b unconventional penetration testing tactics and techniques |c Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
264 | 1 | |a Amsterdam |b Syngress/Elsevier |c c2011 | |
300 | |a 1 Online-Ressource (xxii, 310 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
700 | 1 | |a Andress, Jason |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495882 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737703 |
Datensatz im Suchindex
_version_ | 1804152878436188160 |
---|---|
any_adam_object | |
author | Wilhelm, Thomas |
author_facet | Wilhelm, Thomas |
author_role | aut |
author_sort | Wilhelm, Thomas |
author_variant | t w tw |
building | Verbundindex |
bvnumber | BV042300711 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)677829108 (DE-599)BVBBV042300711 |
dewey-full | 658.472 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.472 |
dewey-search | 658.472 |
dewey-sort | 3658.472 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02777nmm a2200397zc 4500</leader><controlfield tag="001">BV042300711</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495882</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-588-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495883</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-588-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677829108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300711</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.472</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilhelm, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ninja hacking</subfield><subfield code="b">unconventional penetration testing tactics and techniques</subfield><subfield code="c">Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">c2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 310 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495882</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737703</subfield></datafield></record></collection> |
id | DE-604.BV042300711 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9781597495882 1597495883 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737703 |
oclc_num | 677829108 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxii, 310 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Wilhelm, Thomas Verfasser aut Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant Amsterdam Syngress/Elsevier c2011 1 Online-Ressource (xxii, 310 p.) txt rdacontent c rdamedia cr rdacarrier Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks Includes bibliographical references and index Business enterprises / Computer networks / Security measures fast Unternehmen Business enterprises Computer networks Security measures Andress, Jason Sonstige oth http://www.sciencedirect.com/science/book/9781597495882 Verlag Volltext |
spellingShingle | Wilhelm, Thomas Ninja hacking unconventional penetration testing tactics and techniques Business enterprises / Computer networks / Security measures fast Unternehmen Business enterprises Computer networks Security measures |
title | Ninja hacking unconventional penetration testing tactics and techniques |
title_auth | Ninja hacking unconventional penetration testing tactics and techniques |
title_exact_search | Ninja hacking unconventional penetration testing tactics and techniques |
title_full | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_fullStr | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_full_unstemmed | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_short | Ninja hacking |
title_sort | ninja hacking unconventional penetration testing tactics and techniques |
title_sub | unconventional penetration testing tactics and techniques |
topic | Business enterprises / Computer networks / Security measures fast Unternehmen Business enterprises Computer networks Security measures |
topic_facet | Business enterprises / Computer networks / Security measures Unternehmen Business enterprises Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597495882 |
work_keys_str_mv | AT wilhelmthomas ninjahackingunconventionalpenetrationtestingtacticsandtechniques AT andressjason ninjahackingunconventionalpenetrationtestingtacticsandtechniques |