Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in ...

Buy Now From Amazon

Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices available online.

Similar Products

The Beginner's Guide to the Internet UndergroundMake Your Smartphone 007 Smart: NEW 2017 EditionIncognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching OnlineReally Private Browsing: An Unofficial User’s Guide to TorWindows Hacking: crack all cool stuff of windowsHACKING : An unofficial anonymous guide : Windows and InternetA Hacker's Life Starter: Security Penetration Anywhere & Anytime