Ninja Hacking

Unconventional Penetration Testing Tactics and Techniques

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Ninja Hacking by Thomas Wilhelm, Jason Andress, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Thomas Wilhelm, Jason Andress ISBN: 9781597495899
Publisher: Elsevier Science Publication: November 2, 2010
Imprint: Syngress Language: English
Author: Thomas Wilhelm, Jason Andress
ISBN: 9781597495899
Publisher: Elsevier Science
Publication: November 2, 2010
Imprint: Syngress
Language: English

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.

This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.

This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

  • Discusses techniques used by malicious attackers in real-world situations
  • Details unorthodox penetration testing techniques by getting inside the mind of a ninja
  • Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.

This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.

This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

More books from Elsevier Science

Cover of the book Biointegration of Medical Implant Materials by Thomas Wilhelm, Jason Andress
Cover of the book Wireless Networking by Thomas Wilhelm, Jason Andress
Cover of the book International Review of Neurobiology by Thomas Wilhelm, Jason Andress
Cover of the book Handbook of Biologically Active Peptides by Thomas Wilhelm, Jason Andress
Cover of the book Routley-Meyer Ternary Relational Semantics for Intuitionistic-type Negations by Thomas Wilhelm, Jason Andress
Cover of the book Atlas of Drosophila Morphology by Thomas Wilhelm, Jason Andress
Cover of the book Fundamentals of Equilibrium and Steady-State Thermodynamics by Thomas Wilhelm, Jason Andress
Cover of the book Advances in Imaging and Electron Physics by Thomas Wilhelm, Jason Andress
Cover of the book The Germination of Seeds by Thomas Wilhelm, Jason Andress
Cover of the book Geochemical Anomaly and Mineral Prospectivity Mapping in GIS by Thomas Wilhelm, Jason Andress
Cover of the book Promoting Adolescent Health by Thomas Wilhelm, Jason Andress
Cover of the book Molecular Beam Epitaxy by Thomas Wilhelm, Jason Andress
Cover of the book Nagios 3 Enterprise Network Monitoring by Thomas Wilhelm, Jason Andress
Cover of the book Human Herpesviruses HHV-6A, HHV-6B and HHV-7 by Thomas Wilhelm, Jason Andress
Cover of the book Thermosets by Thomas Wilhelm, Jason Andress
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy