Book description
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.
This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.
This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
- Discusses techniques used by malicious attackers in real-world situations
- Details unorthodox penetration testing techniques by getting inside the mind of a ninja
- Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks
Table of contents
- Cover
- Title Page
- Copyright
- Table of Contents
- About the Authors
- About the Ninjutsu Consultant
- About the Technical Editor
- Introduction
- Chapter 1: The Historical Ninja
- Chapter 2: The Modern Ninja
- Chapter 3: Strategies and Tactics
- Chapter 4: Exploitation of Current Events
- Chapter 5: Disguise
- Chapter 6: Impersonation
- Chapter 7: Infiltration
- Chapter 8: Use of Timing to Enter an Area
- Chapter 9: Discovering Weak Points in Area Defenses
- Chapter 10: Psychological Weaknesses
- Chapter 11: Distraction
- Chapter 12: Concealment Devices
- Chapter 13: Covert Listening Devices
- Chapter 14: Intelligence
- Chapter 15: Surveillance
- Chapter 16: Sabotage
- Chapter 17: Hiding and Silent Movement
- Index
Product information
- Title: Ninja Hacking
- Author(s):
- Release date: November 2010
- Publisher(s): Syngress
- ISBN: 9781597495899
You might also like
book
Hacking Exposed Mobile
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new …
book
Hacking Exposed Wireless, Third Edition, 3rd Edition
Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network …
book
Low Tech Hacking
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest …
book
Hacking the Hacker
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker …