Ninja Hacking
Details
Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? This title helps to use the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment.
Autorentext
Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.
Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master's degrees in both Computer Science and Management.
His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.
Klappentext
A penetration tester or security consultant perform security tests both externally and internally for clients that include both physical and technical tests. See how Thomas Wilhelm throws traditional pen testing methods out the window for now and how thinking and acting like a ninja can actually grant quicker and more complete access to a company s assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs.
Zusammenfassung
Discusses techniques used by malicious attackers in real-world situations; details unorthodox penetration testing techniques by getting inside the mind of a ninja; and, expands upon penetration testing methodologies including new tactics for hardware and physical attacks.
Inhalt
Introduction
Chapter 1. The Historical Ninja
Chapter 2. The Modern Ninja
Chapter 3. Strategies and Tactics
Chapter 4. Exploitation of Current Events
Chapter 5. Disguise
Chapter 6. Impersonation
Chapter 7. Infiltration
Chapter 8. Use of Timing to Enter an Area
Chapter 9. Discovering Weak Points in Area Defenses
Chapter 10. Psychological Weaknesses
Chapter 11. Distraction
Chapter 12. Concealment Devices
Chapter 13. Covert Listening Devices
Chapter 14. Intelligence
Chapter 15. Surveillance
Chapter 16. Sabotage
Chapter 17. Hiding and Silent Movement
Weitere Informationen
- Allgemeine Informationen
- GTIN 09781597495882
- Sprache Englisch
- Größe H233mm x B191mm x T25mm
- Jahr 2010
- EAN 9781597495882
- Format Kartonierter Einband
- ISBN 978-1-59749-588-2
- Veröffentlichung 23.09.2010
- Titel Ninja Hacking
- Autor Thomas Wilhelm , Jason Andress
- Untertitel Unconventional Penetration Testing Tactics and Techniques
- Gewicht 717g
- Herausgeber Syngress Media,U.S.
- Anzahl Seiten 336
- Genre Informatik