Cargando…

Ninja hacking: unconventional penetration testing tactics and techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technic...

Descripción completa

Detalles Bibliográficos
Autores principales: Wilhelm, Thomas, Andress, Jason
Lenguaje:eng
Publicado: Elsevier 2010
Materias:
Acceso en línea:http://cds.cern.ch/record/1612792
_version_ 1780932251021737984
author Wilhelm, Thomas
Andress, Jason
author_facet Wilhelm, Thomas
Andress, Jason
author_sort Wilhelm, Thomas
collection CERN
description Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: di
id cern-1612792
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2010
publisher Elsevier
record_format invenio
spelling cern-16127922021-04-21T22:11:41Zhttp://cds.cern.ch/record/1612792engWilhelm, ThomasAndress, JasonNinja hacking: unconventional penetration testing tactics and techniquesComputing and ComputersEver thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: diElsevieroai:cds.cern.ch:16127922010
spellingShingle Computing and Computers
Wilhelm, Thomas
Andress, Jason
Ninja hacking: unconventional penetration testing tactics and techniques
title Ninja hacking: unconventional penetration testing tactics and techniques
title_full Ninja hacking: unconventional penetration testing tactics and techniques
title_fullStr Ninja hacking: unconventional penetration testing tactics and techniques
title_full_unstemmed Ninja hacking: unconventional penetration testing tactics and techniques
title_short Ninja hacking: unconventional penetration testing tactics and techniques
title_sort ninja hacking: unconventional penetration testing tactics and techniques
topic Computing and Computers
url http://cds.cern.ch/record/1612792
work_keys_str_mv AT wilhelmthomas ninjahackingunconventionalpenetrationtestingtacticsandtechniques
AT andressjason ninjahackingunconventionalpenetrationtestingtacticsandtechniques