𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

✍ Scribed by Wilhelm, Thomas, Andress, Jason


Publisher
Elsevier Science
Year
2014
Tongue
English
Leaves
333
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from Β Read more...


Abstract: Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War appli

✦ Table of Contents


Content: Front Cover --
Ninja Hacking --
Copyright --
Table of Contents --
About the Authors --
About the Ninjutsu Consultant --
About the Technical Editor --
Introduction --
Chapter 1. The Historical Ninja --
The Historical Samurai --
The Historical Ninja --
Samurai versus Ninja --
Summary --
Endnotes --
Chapter 2. The Modern Ninja --
Modern-Day Ninjutsu --
White Hats versus Black Hats --
Ethics of a Modern-Day Ninja --
Summary --
Endnotes --
Chapter 3. Strategies and Tactics --
The Art of War --
Breaking the Rules --
Laying Plans --
Waging War --
Maneuvering --
The Use of Spies. Preconceived Notions --
Summary --
Endnotes --
Acknowledgment --
Chapter 4. Exploitation of Current Events --
Playing on People's Fears and Curiosity --
Exploiting Patch Windows and Processes --
Summary --
Endnotes --
Chapter 5. Disguise --
Hensō
jutsu (Disguise) --
The Modern "Seven Ways of Going" --
Virtual Disguises --
Summary --
Endnotes --
Chapter 6. Impersonation --
Pretexting --
Phishing --
Summary --
Endnotes --
Chapter 7. Infiltration --
Lock Picking and Safe Cracking --
Alarm System Evasion --
Trusted Networks --
Summary --
Endnotes --
Chapter 8. Use of Timing to Enter an Area. Tailgating --
Intrusion Detection System Avoidance --
Summary --
Endnotes --
Chapter 9. Discovering Weak Points in Area Defenses --
Traffic Patterns --
Gates, Guns, and Guards --
Information Diving --
Summary --
Endnotes --
Chapter 10. Psychological Weaknesses --
Baiting --
Social Engineering --
Summary --
Endnotes --
Chapter 11. Distraction --
Use of Big Events --
Shill Web Sites --
Multipronged Attacks --
Summary --
Endnotes --
Chapter 12. Concealment Devices --
Mobile Devices --
Data Smuggling --
Summary --
Endnotes --
Chapter 13. Covert Listening Devices --
Radio Frequency Scanners. Key Logging --
Spyware --
Clandestinely Placed Sensors --
Summary --
Endnotes --
Chapter 14. Intelligence --
Human Intelligence --
Interrogation Techniques --
Clandestine Human Intelligence --
Summary --
Endnotes --
Chapter 15. Surveillance --
Gathering Intelligence --
Location Tracking --
Detecting Surveillance --
Antisurveillance Devices --
Summary --
Endnotes --
Chapter 16. Sabotage --
Logical Sabotage --
Physical Sabotage --
Sources of Sabotage --
Summary --
Endnotes --
Chapter 17. Hiding and Silent Movement --
Attack Location Obfuscation --
Compromised Hardware --
Log Manipulation --
Summary.

✦ Subjects


Computer crimes;Prevention;Computer hackers;Computer security


πŸ“œ SIMILAR VOLUMES


Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te

Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical te

Ninja Hacking Unconventional Penetration
✍ Thomas Wilhelm, Jason Andress, Bryan (con) Garner πŸ“‚ Library πŸ“… 2011 πŸ› Elsevier 🌐 English

<h3>Pressestimmen</h3><p>"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict re

Ninja Hacking: Unconventional Penetratio
✍ Thomas Wilhelm, Jason Andress πŸ“‚ Library πŸ“… 2010 πŸ› Syngress 🌐 English

<p>Ever thought of using the time-tested tactics and techniques ofΒ the ancientΒ ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical

Hacking with Kali: Practical Penetration
✍ James Broad, Andrew Bindner πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of