Wednesday, January 23, 2013

Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques



Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods or professional practices, may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information or methods described herein. In using such information or methods they
should be mindful of their own safety and the safety of others, including parties for whom they have a
professional responsibility.






About the Authors :
Thomas Wilhelm has been involved in Information Security since 1990, where
including DefCon, HOPE, and CSI, he has been employed by Fortune 100 companies to conduct risk assessments, participate and lead in external and internal penetration testing efforts, and manage Information Systems Security projects.maintains the following security certifications: ISSMP,CISSP, SCSECA, and SCNA.
Jason Andress (ISSAP, CISSP, GISP, GSEC, CEH, Security+) is a seasoned
security professional with a depth of experience in both the academic and business
worlds. He is presently employed by a major software company, providing global
information security oversight, and performing penetration testing, risk assessment,
and compliance functions to ensure that the company’s assets are protected.
Table of Contents : 
  • Chapter 1: The Historical Ninja
  • Chapter 2: The Modern Ninja
  • Chapter 3: Strategies and Tactics
  • Chapter 4: Exploitation of Current Events
  • Chapter 5: Disguise
  • Chapter 6: Impersonation
  • Chapter 7: Infiltration
  • Chapter 8: Use of Timing to Enter an Area
  • Chapter 9: Discovering Weak Points in Area Defenses
  • Chapter 10: Psychological Weaknesses
  • Chapter 11: Distraction
  • Chapter 12: Concealment Devices
  • Chapter 13: Covert Listening Devices
  • Chapter 14: Intelligence
  • Chapter 15: Surveillance
  • Chapter 16: Sabotage
  • Chapter 17: Hiding and Silent Movement
Download

No comments:

Post a Comment