Ninja Hacking Ninja Hacking

Ninja Hacking

Unconventional Penetration Testing Tactics and Techniques

    • 5.0 • 1개의 평가
    • US$49.99
    • US$49.99

출판사 설명

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks.

This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities.

This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.



- Discusses techniques used by malicious attackers in real-world situations

- Details unorthodox penetration testing techniques by getting inside the mind of a ninja

- Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

장르
컴퓨터 및 인터넷
출시일
2010년
11월 2일
언어
EN
영어
길이
336
페이지
출판사
Syngress
판매자
Elsevier Ltd.
크기
9.3
MB
Cyberjutsu Cyberjutsu
2021년
Cyber Crime and Espionage Cyber Crime and Espionage
2011년
Reverse Deception: Organized Cyber Threat Counter-Exploitation Reverse Deception: Organized Cyber Threat Counter-Exploitation
2012년
Unauthorised Access Unauthorised Access
2010년
Advanced Persistent Threat Hacking Advanced Persistent Threat Hacking
2014년
The Basics of Information Security The Basics of Information Security
2014년
Military Dictionary Military Dictionary
2019년
Professional Penetration Testing Professional Penetration Testing
2015년
Professional Penetration Testing Professional Penetration Testing
2013년
A Military Dictionary and Gazetteer A Military Dictionary and Gazetteer
2023년
A Military Dictionary and Gazetteer A Military Dictionary and Gazetteer
2019년
Manipulationstechniken Manipulationstechniken
2025년