Ninja Hacking -  Jason Andress,  Thomas Wilhelm

Ninja Hacking (eBook)

Unconventional Penetration Testing Tactics and Techniques
eBook Download: PDF | EPUB
2010 | 1. Auflage
336 Seiten
Elsevier Science (Verlag)
978-1-59749-589-9 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
38,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. - Discusses techniques used by malicious attackers in real-world situations - Details unorthodox penetration testing techniques by getting inside the mind of a ninja - Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI. Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a practice director and a managing director, he has played a pivotal role in executing offensive and defensive security initiatives for Fortune 100 companies and leading research and tool development that has influenced the security industry. Presently, he serves as a managing director at Redstone Securities and possesses master's degrees in both Computer Science and Management. His influence also extends to education where he formerly held the position of Associate Professor at Colorado Technical University. Thomas has also written various publications, including magazines and books. Through Pentest.TV, he continues to provide advanced security training and has obtained numerous certifications over the years, including the ISSMP, CISSP, CCNP Security, AWS Cloud Solutions Architect, AWS Cloud Security Specialist, and multiple Solaris certifications as well.
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers. - Discusses techniques used by malicious attackers in real-world situations- Details unorthodox penetration testing techniques by getting inside the mind of a ninja- Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Front Cover 1
Ninja Hacking 4
Copyright 5
Table of Contents 6
About the Authors 14
About the Ninjutsu Consultant 16
About the Technical Editor 16
Introduction 18
Chapter 1. The Historical Ninja 24
The Historical Samurai 26
The Historical Ninja 31
Samurai versus Ninja 41
Summary 44
Endnotes 45
Chapter 2. The Modern Ninja 46
Modern-Day Ninjutsu 47
White Hats versus Black Hats 49
Ethics of a Modern-Day Ninja 54
Summary 59
Endnotes 59
Chapter 3. Strategies and Tactics 60
The Art of War – Breaking the Rules 61
Laying Plans 63
Waging War 69
Maneuvering 71
The Use of Spies 74
Preconceived Notions 78
Summary 84
Endnotes 85
Acknowledgment 85
Chapter 4. Exploitation of Current Events 86
Playing on People’s Fears and Curiosity 86
Exploiting Patch Windows and Processes 92
Summary 95
Endnotes 96
Chapter 5. Disguise 98
Hens?jutsu (Disguise) 99
The Modern “Seven Ways of Going” 102
Virtual Disguises 107
Summary 109
Endnotes 110
Chapter 6. Impersonation 112
Pretexting 113
Phishing 118
Summary 123
Endnotes 123
Chapter 7. Infiltration 126
Lock Picking and Safe Cracking 126
Alarm System Evasion 134
Trusted Networks 136
Summary 140
Endnotes 141
Chapter 8. Use of Timing to Enter an Area 142
Tailgating 142
Intrusion Detection System Avoidance 148
Summary 156
Endnotes 156
Chapter 9. Discovering Weak Points in Area Defenses 158
Traffic Patterns 158
Gates, Guns, and Guards 163
Information Diving 167
Summary 171
Endnotes 172
Chapter 10. Psychological Weaknesses 174
Baiting 174
Social Engineering 180
Summary 187
Endnotes 188
Chapter 11. Distraction 190
Use of Big Events 190
Shill Web Sites 195
Multipronged Attacks 199
Summary 203
Endnotes 204
Chapter 12. Concealment Devices 206
Mobile Devices 207
Data Smuggling 221
Summary 227
Endnotes 228
Chapter 13. Covert Listening Devices 230
Radio Frequency Scanners 230
Key Logging 233
Spyware 237
Clandestinely Placed Sensors 243
Summary 248
Endnotes 248
Chapter 14. Intelligence 250
Human Intelligence 250
Interrogation Techniques 254
Clandestine Human Intelligence 260
Summary 267
Endnotes 267
Chapter 15. Surveillance 270
Gathering Intelligence 271
Location Tracking 277
Detecting Surveillance 281
Antisurveillance Devices 283
Summary 288
Endnotes 288
Chapter 16. Sabotage 290
Logical Sabotage 291
Physical Sabotage 295
Sources of Sabotage 301
Summary 306
Endnotes 306
Chapter 17. Hiding and Silent Movement 308
Attack Location Obfuscation 309
Compromised Hardware 317
Log Manipulation 319
Summary 323
Endnotes 324
Index 326

Erscheint lt. Verlag 2.11.2010
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Wirtschaft Betriebswirtschaft / Management
ISBN-10 1-59749-589-1 / 1597495891
ISBN-13 978-1-59749-589-9 / 9781597495899
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 10,3 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 4,1 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99