gogogo
Syndetics cover image
Image from Syndetics

Ninja hacking [electronic book] : unconventional penetration testing tactics and techniques / Thomas Wilhelm, Jason Andress ; Bryan Garner, Ninjutsu consultant.

By: Contributor(s): Material type: TextTextPublication details: Amsterdam ; Boston : Syngress/Elsevier, c2011.Description: xxii, 310 p. : ill. ; 24 cmISBN:
  • 1597495883 (electronic bk.)
  • 9781597495882 (electronic bk.)
Subject(s): Genre/Form: Additional physical formats: Print version:: Ninja hacking.Online resources:
Contents:
Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement.
Summary: Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.
No physical items for this record

Enhanced descriptions from Syndetics:

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.

This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.

This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

Includes bibliographical references and index.

Introduction -- Chapter 1: The Historical Ninja -- Chapter 2: The Modern Ninja -- Chapter 3: Strategies and Tactics -- Chapter 4: Exploitation of Current Events -- Chapter 5: Disguise -- Chapter 6: Impersonation -- Chapter 7: Infiltration -- Chapter 8: Use of Timing To Enter an Area -- Chapter 9: Discovering Weak Points in Area Defenses -- Chapter 10: Psychological Weaknesses -- Chapter 11: Distraction -- Chapter 12: Concealment Devices -- Chapter 13: Covert Listening Devices -- Chapter 14: Intelligence -- Chapter 15: Surveillance -- Chapter 16: Sabotage -- Chapter 17: Hiding and Silent Movement.

Ever thought of using the time-tested tactics and techniques of a ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does by thinking outside of the box with these unorthodox techniques. Use all of the tools that the ninja has at his side such as disguise, espionage, stealth, and concealment. Learn how to benefit from these by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Use the tactics of a ninja such as disguise, espionage, stealth, and concealment to protect your company's assets Details unorthodox penetration testing techniques by thinking outside of the box and inside the mind of a ninja Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on Nov. 3, 2010). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • Introduction
  • Chapter 1 The Historical Ninja
  • Chapter 2 The Modern Ninja
  • Chapter 3 Strategies and Tactics
  • Chapter 4 Exploitation of Current Events
  • Chapter 5 Disguise
  • Chapter 6 Impersonation
  • Chapter 7 Infiltration
  • Chapter 8 Use of Timing to Enter an Area
  • Chapter 9 Discovering Weak Points in Area Defenses
  • Chapter 10 Psychological Weaknesses
  • Chapter 11 Distraction
  • Chapter 12 Concealment Devices
  • Chapter 13 Covert Listening Devices
  • Chapter 14 Intelligence
  • Chapter 15 Surveillance
  • Chapter 16 Sabotage
  • Chapter 17 Hiding and Silent Movement

Author notes provided by Syndetics

Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst / Russian Linguist / Cryptanalyst. A speaker at security conferences across the United States, including DefCon, HOPE, and CSI, he has been employed by Fortune 100 companies to conduct risk assessments, participate and lead in external and internal penetration testing efforts, and manage Information Systems Security projects.Thomas is also an Information Technology Doctoral student who holds Masters degrees in both Computer Science and Management. Additionally, he dedicates some of his time as an Associate Professor at Colorado Technical University and has contributed to multiple publications, including both magazines and books. Thomas currently performs security training courses for both civilian and government personnel through Heorot.net, and maintains the following security certifications: ISSMP, CISSP, SCSECA, and SCNA.

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Powered by Koha