Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices
Sunday, October 12, 2014
The Hacker's Briefcase (Hacker Magazine Book 1) Book Online
Read The Hacker's Briefcase (Hacker Magazine Book 1) book online now. You also can download comics, magazine and also books. Get online The Hacker's Briefcase (Hacker Magazine Book 1) today.
Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices
Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment