Discusses techniques used by malicious attackers in real-world situations; details unorthodox penetration testing techniques by getting inside the mind of a ninja; &, expands upon penetration testing methodologies including new tactics for hardware & physical attacks.