Description
Condition - Very Good
The item shows wear from consistent use, but it remains in good condition and functions properly. Item may arrive with damaged packaging or be repackaged. It may be marked, have identifying markings on it, or have minor cosmetic damage. It may also be missing some parts/accessories or bundled items.
The Hacker’s Briefcase (Hacker Magazine Book 1)
Anyone who’s ever seriously delved into pentesting or hacking is likely to have ended up stuck just a single step away from a successfully orchestrated attack. Kevin Mitnick’s The Art of Intrusion describes in detail the story of a particular pentest where the testers ran into trouble in the form of a firewall properly configured by the system administrator. It seemed that there was no chance of breaking through and accessing the company’s internal network. However, one of the team members had found a functional network socket in the lobby and secretly used it to connect a miniature wireless access device (which no one ended up noticing until the end of the testing procedure). This allowed the pentest team to acquire direct access to the company’s internal network by means of Wi-Fi. This is just one of many examples that illustrate how important it is not to underestimate hacking devices. Inspired by this piece of wisdom, we’ll be looking into some of the more curious devices available online.