Cargando…
Ninja hacking: unconventional penetration testing tactics and techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technic...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1612792 |
_version_ | 1780932251021737984 |
---|---|
author | Wilhelm, Thomas Andress, Jason |
author_facet | Wilhelm, Thomas Andress, Jason |
author_sort | Wilhelm, Thomas |
collection | CERN |
description | Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: di |
id | cern-1612792 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-16127922021-04-21T22:11:41Zhttp://cds.cern.ch/record/1612792engWilhelm, ThomasAndress, JasonNinja hacking: unconventional penetration testing tactics and techniquesComputing and ComputersEver thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: diElsevieroai:cds.cern.ch:16127922010 |
spellingShingle | Computing and Computers Wilhelm, Thomas Andress, Jason Ninja hacking: unconventional penetration testing tactics and techniques |
title | Ninja hacking: unconventional penetration testing tactics and techniques |
title_full | Ninja hacking: unconventional penetration testing tactics and techniques |
title_fullStr | Ninja hacking: unconventional penetration testing tactics and techniques |
title_full_unstemmed | Ninja hacking: unconventional penetration testing tactics and techniques |
title_short | Ninja hacking: unconventional penetration testing tactics and techniques |
title_sort | ninja hacking: unconventional penetration testing tactics and techniques |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1612792 |
work_keys_str_mv | AT wilhelmthomas ninjahackingunconventionalpenetrationtestingtacticsandtechniques AT andressjason ninjahackingunconventionalpenetrationtestingtacticsandtechniques |