Ninja Hacking : Unconventional Penetration Testing Tactics and TechniquesMaterial type: TextSeries: eBooks on DemandPublisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (333 p.)ISBN: 9781597495899Subject(s): Computer crimes --Prevention | Computer hackers | Computer securityGenre/Form: Electronic books.Additional physical formats: Print version:: Ninja Hacking : Unconventional Penetration Testing Tactics and TechniquesDDC classification: 005.8 LOC classification: QA76.9.A25W548 2011Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25W548 2011 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=629977||Available||EBL629977|
Front Cover; Ninja Hacking; Copyright; Table of Contents; About the Authors; About the Ninjutsu Consultant; About the Technical Editor; Introduction; Chapter 1. The Historical Ninja; The Historical Samurai; The Historical Ninja; Samurai versus Ninja; Summary; Endnotes; Chapter 2. The Modern Ninja; Modern-Day Ninjutsu; White Hats versus Black Hats; Ethics of a Modern-Day Ninja; Summary; Endnotes; Chapter 3. Strategies and Tactics; The Art of War - Breaking the Rules; Laying Plans; Waging War; Maneuvering; The Use of Spies; Preconceived Notions; Summary; Endnotes; Acknowledgment
Chapter 4. Exploitation of Current EventsPlaying on People's Fears and Curiosity; Exploiting Patch Windows and Processes; Summary; Endnotes; Chapter 5. Disguise; Hensōjutsu (Disguise); The Modern "Seven Ways of Going"; Virtual Disguises; Summary; Endnotes; Chapter 6. Impersonation; Pretexting; Phishing; Summary; Endnotes; Chapter 7. Infiltration; Lock Picking and Safe Cracking; Alarm System Evasion; Trusted Networks; Summary; Endnotes; Chapter 8. Use of Timing to Enter an Area; Tailgating; Intrusion Detection System Avoidance; Summary; Endnotes
Chapter 9. Discovering Weak Points in Area DefensesTraffic Patterns; Gates, Guns, and Guards; Information Diving; Summary; Endnotes; Chapter 10. Psychological Weaknesses; Baiting; Social Engineering; Summary; Endnotes; Chapter 11. Distraction; Use of Big Events; Shill Web Sites; Multipronged Attacks; Summary; Endnotes; Chapter 12. Concealment Devices; Mobile Devices; Data Smuggling; Summary; Endnotes; Chapter 13. Covert Listening Devices; Radio Frequency Scanners; Key Logging; Spyware; Clandestinely Placed Sensors; Summary; Endnotes; Chapter 14. Intelligence; Human Intelligence
Interrogation TechniquesClandestine Human Intelligence; Summary; Endnotes; Chapter 15. Surveillance; Gathering Intelligence; Location Tracking; Detecting Surveillance; Antisurveillance Devices; Summary; Endnotes; Chapter 16. Sabotage; Logical Sabotage; Physical Sabotage; Sources of Sabotage; Summary; Endnotes; Chapter 17. Hiding and Silent Movement; Attack Location Obfuscation; Compromised Hardware; Log Manipulation; Summary; Endnotes; Index
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies. <br>The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzus The Art of War appli
Description based upon print version of record.