Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Autor Thomas Wilhelm, Jason Andressen Limba Engleză Paperback – 2 noi 2010
This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.
This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
- Discusses techniques used by malicious attackers in real-world situations
- Details unorthodox penetration testing techniques by getting inside the mind of a ninja
- Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks
Preț: 199.10 lei
Preț vechi: 254.43 lei
-22% Nou
Puncte Express: 299
Preț estimativ în valută:
38.11€ • 39.63$ • 31.93£
38.11€ • 39.63$ • 31.93£
Carte tipărită la comandă
Livrare economică 06-20 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495882
ISBN-10: 1597495883
Pagini: 336
Ilustrații: 100 illustrations
Dimensiuni: 191 x 235 x 20 mm
Greutate: 0.7 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597495883
Pagini: 336
Ilustrații: 100 illustrations
Dimensiuni: 191 x 235 x 20 mm
Greutate: 0.7 kg
Editura: ELSEVIER SCIENCE
Public țintă
Penetration testers; Security consultants; IT security professionals including system / network administrators; hackersCuprins
Introduction
Chapter 1. The Historical Ninja
Chapter 2. The Modern Ninja
Chapter 3. Strategies and Tactics
Chapter 4. Exploitation of Current Events
Chapter 5. Disguise
Chapter 6. Impersonation
Chapter 7. Infiltration
Chapter 8. Use of Timing to Enter an Area
Chapter 9. Discovering Weak Points in Area Defenses
Chapter 10. Psychological Weaknesses
Chapter 11. Distraction
Chapter 12. Concealment Devices
Chapter 13. Covert Listening Devices
Chapter 14. Intelligence
Chapter 15. Surveillance
Chapter 16. Sabotage
Chapter 17. Hiding and Silent Movement
Chapter 1. The Historical Ninja
Chapter 2. The Modern Ninja
Chapter 3. Strategies and Tactics
Chapter 4. Exploitation of Current Events
Chapter 5. Disguise
Chapter 6. Impersonation
Chapter 7. Infiltration
Chapter 8. Use of Timing to Enter an Area
Chapter 9. Discovering Weak Points in Area Defenses
Chapter 10. Psychological Weaknesses
Chapter 11. Distraction
Chapter 12. Concealment Devices
Chapter 13. Covert Listening Devices
Chapter 14. Intelligence
Chapter 15. Surveillance
Chapter 16. Sabotage
Chapter 17. Hiding and Silent Movement
Recenzii
"The hacking community is fraught with Eastern military comparisons. Like the ninja, we are continuing to come out of the shadows of our communal origins and grow into respected members of a larger society. As our industry matures, it demands more formal education, strict regulations and an adherence to a code of ethics. Therefore it becomes increasingly difficult to incorporate the culture of the unconventional warrior into our new world. Enter Wilhelm and Andress, who make it safe to show off your fu again. By the end of this book, the security professional is given the philosophical foundation along with a practical framework from which to leverage the way of the ninja. What could be cooler?"--Overall, Ninja Hacking has excellent relevant material and a significant amount of Ninja lore and history. While this book is not a technical reference, it is an excellent choice for someone who has an interest in Ninjas or someone who is looking for inspiration to think differently about penetration testing and security concepts. The mappings for traditional Ninja skills to the skills of today are mostly well-coupled and are always relevant to how the leaders in the field are addressing security today."----Donald C. Donzal, Editor-in-Chief, The Ethical Hacker Network
"When they put "unconventional" in the title, the authors weren't exaggerating. Perhaps the most unusual book written on computer security, this volume centers around detailed descriptions of the ethics, mindset, and tactics used in the Japanese martial arts commonly called ninja. The history of ninja fighting arts and the samurai warriors who practiced them are described in the first chapter. Each subsequent chapter presents specific ninja tactics, including intelligence, use of weapons, surveillance, and sabotage, then applies them to effective computer security management. Both authors are computer security specialists. The book also benefits from a Ninjutsu consultant, Bryan R. Garner, and a technical editor, Joshua Abraham."--SciTechBookNews
"With the good blend of historical techniques and its modern day application there is something in here for everyone."--Hakin9
"Be in no doubt, credibility is high for this book..All in all, while the writing style is light, the content is, for lack of a better term, meaty. This is definitely not recommended as an entry level book, but it is an excellent resource for penetration testers and those thinking of commissioning pen tests on their systems."--Paul Baccas, NakedSecurity.com, Oct. 25, 2011,
"When they put "unconventional" in the title, the authors weren't exaggerating. Perhaps the most unusual book written on computer security, this volume centers around detailed descriptions of the ethics, mindset, and tactics used in the Japanese martial arts commonly called ninja. The history of ninja fighting arts and the samurai warriors who practiced them are described in the first chapter. Each subsequent chapter presents specific ninja tactics, including intelligence, use of weapons, surveillance, and sabotage, then applies them to effective computer security management. Both authors are computer security specialists. The book also benefits from a Ninjutsu consultant, Bryan R. Garner, and a technical editor, Joshua Abraham."--SciTechBookNews
"With the good blend of historical techniques and its modern day application there is something in here for everyone."--Hakin9
"Be in no doubt, credibility is high for this book..All in all, while the writing style is light, the content is, for lack of a better term, meaty. This is definitely not recommended as an entry level book, but it is an excellent resource for penetration testers and those thinking of commissioning pen tests on their systems."--Paul Baccas, NakedSecurity.com, Oct. 25, 2011,