Ninja hacking: unconventional penetration testing tactics and techniques
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests....
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Syngress/Elsevier
© 2011
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxii, 310 pages) illustrations |
ISBN: | 9781597495882 1597495883 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125519 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597495882 |9 978-1-59749-588-2 | ||
020 | |a 1597495883 |9 1-59749-588-3 | ||
035 | |a (ZDB-33-ESD)ocn677829108 | ||
035 | |a (OCoLC)677829108 | ||
035 | |a (DE-599)BVBBV046125519 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.472 |2 22 | |
100 | 1 | |a Wilhelm, Thomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Ninja hacking |b unconventional penetration testing tactics and techniques |c Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
264 | 1 | |a Amsterdam |a Boston |b Syngress/Elsevier |c © 2011 | |
300 | |a 1 online resource (xxii, 310 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks | ||
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
700 | 1 | |a Andress, Jason |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495882 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505973 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495882 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444740059136 |
---|---|
any_adam_object | |
author | Wilhelm, Thomas |
author_facet | Wilhelm, Thomas |
author_role | aut |
author_sort | Wilhelm, Thomas |
author_variant | t w tw |
building | Verbundindex |
bvnumber | BV046125519 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn677829108 (OCoLC)677829108 (DE-599)BVBBV046125519 |
dewey-full | 658.472 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.472 |
dewey-search | 658.472 |
dewey-sort | 3658.472 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02845nmm a2200373zc 4500</leader><controlfield tag="001">BV046125519</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495882</subfield><subfield code="9">978-1-59749-588-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495883</subfield><subfield code="9">1-59749-588-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn677829108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)677829108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125519</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.472</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilhelm, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ninja hacking</subfield><subfield code="b">unconventional penetration testing tactics and techniques</subfield><subfield code="c">Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 310 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495882</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505973</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495882</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125519 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495882 1597495883 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505973 |
oclc_num | 677829108 |
open_access_boolean | |
physical | 1 online resource (xxii, 310 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Wilhelm, Thomas Verfasser aut Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant Amsterdam Boston Syngress/Elsevier © 2011 1 online resource (xxii, 310 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks Business enterprises / Computer networks / Security measures fast Business enterprises Computer networks Security measures Andress, Jason Sonstige oth http://www.sciencedirect.com/science/book/9781597495882 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Wilhelm, Thomas Ninja hacking unconventional penetration testing tactics and techniques Business enterprises / Computer networks / Security measures fast Business enterprises Computer networks Security measures |
title | Ninja hacking unconventional penetration testing tactics and techniques |
title_auth | Ninja hacking unconventional penetration testing tactics and techniques |
title_exact_search | Ninja hacking unconventional penetration testing tactics and techniques |
title_full | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_fullStr | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_full_unstemmed | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant |
title_short | Ninja hacking |
title_sort | ninja hacking unconventional penetration testing tactics and techniques |
title_sub | unconventional penetration testing tactics and techniques |
topic | Business enterprises / Computer networks / Security measures fast Business enterprises Computer networks Security measures |
topic_facet | Business enterprises / Computer networks / Security measures Business enterprises Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597495882 |
work_keys_str_mv | AT wilhelmthomas ninjahackingunconventionalpenetrationtestingtacticsandtechniques AT andressjason ninjahackingunconventionalpenetrationtestingtacticsandtechniques |