NinjaHacking.pdf
(
10095 KB
)
Pobierz
Ninja Hacking
Ninja Hacking
Unconventional Penetration
Testing Tactics and Techniques
Thomas Wilhelm
Jason Andress
Bryan Garner
Ninjutsu Consultant
Joshua Abraham
Technical Editor
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an imprint of Elsevier
Acquiring Editor: Rachel Roumeliotis
Development Editor: Matthew Cater
Project Manager: Laura Smith
Designer: Alisa Andreola
Syngress
is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
© 2011 Elsevier, Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further informa-
tion about the Publisher’s permissions policies and our arrangements with organizations such as the
Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions
.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this ield are constantly changing. As new research and experience
broaden our understanding, changes in research methods or professional practices, may become neces-
sary. Practitioners and researchers must always rely on their own experience and knowledge in evaluat-
ing and using any information or methods described herein. In using such information or methods they
should be mindful of their own safety and the safety of others, including parties for whom they have a
professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume
any liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.
Library of Congress Cataloging-in-Publication Data
Application submitted
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN: 978-1-59749-588-2
Printed in the United States of America
11 12 13 14 15
10 9 8 7 6 5 4 3 2 1
Typeset by: diacriTech, India
For information on all Syngress publications visit our website at
www.syngress.com
About the Authors
Thomas Wilhelm
has been involved in Information Security since 1990, where
he served in the U.S. Army for 8 years as a Signals Intelligence Analyst/Russian
Linguist/Cryptanalyst. A speaker at security conferences across the United States,
including DefCon, HOPE, and CSI, he has been employed by Fortune 100 compa-
nies to conduct risk assessments, participate and lead in external and internal pen-
etration testing efforts, and manage Information Systems Security projects.
Thomas is also an Information Technology Doctoral student who holds Mas-
ters degrees in both Computer Science and Management. Additionally, he dedicates
some of his time as an Associate Professor at Colorado Technical University and has
contributed to multiple publications, including both magazines and books. Thomas
currently performs security training courses for both civilian and government person-
nel through Heorot.net, and maintains the following security certiications: ISSMP,
CISSP, SCSECA, and SCNA.
Jason Andress
(ISSAP, CISSP, GISP, GSEC, CEH, Security+) is a seasoned
security professional with a depth of experience in both the academic and business
worlds. He is presently employed by a major software company, providing global
information security oversight, and performing penetration testing, risk assessment,
and compliance functions to ensure that the company’s assets are protected.
Jason has taught undergraduate and graduate security courses since 2005 and
holds a Doctorate in Computer Science. His research is in the area of data protec-
tion, and he has contributed to several publications, writing on topics including data
security, network security, and digital forensics.
xiii
Plik z chomika:
newk
Inne pliki z tego folderu:
Defense against the Black Arts.pdf
(48194 KB)
NinjaHacking.pdf
(10095 KB)
Inne foldery tego chomika:
programowanie
shell scripting
Zgłoś jeśli
naruszono regulamin